Muuglines the Manitoba UNIX User Group Newsletter

Total Page:16

File Type:pdf, Size:1020Kb

Muuglines the Manitoba UNIX User Group Newsletter MUUGLines The Manitoba UNIX User Group Newsletter Volume 28 No. 10, June 2016 Editor: Bradford C. Vokey Next Meeting: June 14th, 2016, )here to Find the Meeting 7:30 pm University of Winnipeg Room 1M28 Manitoba Hall Main Topic: Gentoo Eric Raine will be presenting on the Gentoo Linux Dist. Differ- ences in installation from Ubuntu will be covered. Also covered is how to configure installation of packages and update. entoo is a free operating s!stem based on either Linux or Free#$D that can be automaticall! optimi%ed and customized for just about any applic- ation or need. RTFM: Termina Control Commands Due to a recent influx of new and novice members 'revor Cordes will be doing an R'") instead of a daemon dash this month. The topic is something ever! *+,- user should master. terminal control commands (i.e.0 ^2 and ^L3 and rudimentar! job control. These little dual ke! presses will streamline !our terminal sessions and make you more efficient. 4ou5ll wonder how you ever got b! without them6 Door %rize'#( )eetings are held in the University of Winnipeg's 'his month we will be giving )anitoba Hall (marked “M” on the map30 along awa! the O8Reill! book #almoral Street south of Ellice Avenue. We can be "Using csh & tcsh"0 found in room 1)@A0 but may occasionall! get b! Paul Du#ois. relocated to nearb! rooms. If there is a change0 it should be conve!ed via a sign on the door to 1)@A. Type Less, Accomplish More. Doors are usuall! open b! 7.CC pm with the meeting starting at 7.DC pm. Parking is available on the An oldie-but-goodie for us surrounding streets. Please see uwinnipeg.ca/maps fans of tcsh: no newer book for further information about parking and access to has been written since0 and the campus. not much has changed in the tcsh world anyhow6 'he latest meeting details are always at: We will also be giving away an ebook (see page 3!" https://www.muug.mb.ca/meetings/ 1 *oo+ Re,ie-: !ou. What do you doJ You “reKuest desktop site” and pinch zoom your way around the content you !ontent .trategy 0or Mobi e reall! want. Chief information officer fail. #eviewed by Trevor Cordes Another omnipresent concept is making your Ever since the publisher A Book content less free-form0 and more highl! structured Apart (A#A3 became affiliated like a database with strong typing and categori%- with '(#eilly Me$ia5s e-book ation. Doing so will make your content more easil! store0 I5ve been curious to read repurposeable to any form factor0 providing some of their output. A#A bills different views into the same content in ways that itself as makers of “brief books better suit each medium. for people who make websites>. I like their focus on short, to the )! onl! beef is that the book feels like it should be point, books0 all of which are even shorter – perhaps b! 2EH – as it seems like around 1EC pages in length. ideas are rehashed and restated several times as Content Strategy for Mobile (($f)3 b! Karen there is some overlapping of concepts between )c rane (@C?@3 fits the bill. chapters. Sometimes the introductions and summaries almost completel! restate the gist ($f) is the first ph!sical A#A book I5ve gotten m! covered in the meat of the section a few pages away. hands on. For the longest time Amazon onl! listed between zero and one of A#A5s offerings. It seems , would like to applaud the interesting ph!sical the! are listing about half of them now0 except all design which has stiff card stock covers that fold but one is onl! available from their third-part! affil- over on themselves to produce an almost hardcover iates. Ver! strange for a going concern such as feel. The books are quite small and eas! to hold0 A#A. At least one alwa!s has the option of ordering however the! cannot be laid flat to read on a table. directl! from A#A at reasonable prices0 but the! are As an added bonus the pictures and some text are in in the U$A and shipping and exchange jack costs up. full colour. The pictures themselves are well chosen, relevant, and interesting and not at all used as filler. "or ebook fans0 life is eas!0 simpl! bu! the ebook version DR)-free from oreill!.com. Better still0 wait Not a book for techies0 but useful nonetheless. until the! roll around as the Deal of the Day and get ,mportantl!0 though from 2C?@ the content is 1CCH them at 5CH off. relevant because of its generalit! and should remain so for man! years. It makes me interested in getting Logistics aside0 C$f) is an interesting little read. Its more A#A titles (especiall! the ones that are for thrust is getting your content on all device form techies63. factors. It focuses solel! on high-level strategizing, and is completel! technology agnostic. It outright states that it is for companies with reams of content M22G has gone social /news providers0 archivists0 museums0 etc3 rather "or better or worse0 you can now find (and follow3 than Joe Schmoe with a personal web site or even e- )UU on some social platforms. Get interactive and commerce installations. Since I5m more the latter share all about MUU on social media! than the former0 I was prepared to be disappointed as I continued reading. twitter.com/manitobaunix ,n the end I came away pleasantl! surprised0 having reaped a modicum of insight that would be facebook.com/ManitobaUnix applicable to m! web ventures. The main example of this is the prescient warning against limiting content on mobile. We5ve all been there. a web site linkedin.com/grps/MUUG-Manitoba- that presents a different view of their site for mobile0 UNIX-Users-Group-1102007 one that arbitraril! limits what content you can meetup.com/Manitoba-UNIX-User-Group access based on the whim of someone who is not 2 Exciting Ne- 31oo+ $oor %rize#4 6 Exce ent !onso e 5inux Fi e )UU recentl! contributed to the No Manager# $tarch “<acking” Humble Bundle ebook offering to obtain 1D U+,-M"L7$$ish ebooks at an amazing price0 while supporting the EF" and No Starch5s authors to boot. ;e will be giving away one or two ebooks per meeting over the next year until the! are all gone. ;e will have several titles present and the winner can choose for themselves which to take. The books are each in pdf0 mobi and epub formats and will be provided on CD-R. The! are DR)-free and winners are expected to abide b! ethical ebook guidelines such as the one O5Reill! uses. “You can freel! loan, ;as anyone intrigued about Linux file managers re-sell or donate them0 read them without being after our April 1@th meeting? That is when Brian tracked0 or move them to a new device.” As Tim Lowe demonstrated G+U Plot using Midnight 75Reill! says. “Fail to honor people0 the! fail to (ommander for almost all of his commands. honor you.> ;ell here is a quick summar! of the top 6 file 'he titles are. A Bug H+nter’s Diary0 A+tomate the managers for linux.. Boring Stu** with Python0 Bitcoin for the Be*+$$le$0 Black Hat Python0 Designing BS- Rootkits0 ,acking/ Midnight Commander The Art o* Exploitation0 ,acking the Xbo10 The Lin+x User-friendl! yet powerful orthodox file manager Comman$ Line0 Maker’s G+i$e to the Zombie Apoca5 lypse0 Practical Malware Analysis0 Python Crash Ranger Co+rse0 )ilence on the Wire0 )mart Girl’s G+i$e to "ile manager with an ncurses frontend written in Privacy. 9!thon $o pick your favourite ahead of time in case you WCM Commander win! And for all those who missed the Humble A Far Manager clone #undle and want to purchase some of these titles0 Vifm the! are all available on oreill!.com. ncurses based file manager with vi like ke!bindings Sprea" The )or"4 Last File Manager ? or 2 pane Python based file manager <elp us promote this month8s meeting, b! !e"romancer#s Dos Navigator putting this poster up (lone of the famous "+orton CommanderO on your workplace bulletin board or Download one or two and tr! them out6 other suitable public message board. A good review0 including details about each file manager can be found here. http://www.muug.ca/meetings/MUUGmeeting.pdf http://www.linuxlinks.com/article/201605290 Do you have a friend or co-worker that has shown 41840705/BestConsoleFileManagers.html an interest in Unix0 Linux0 B$D0 etcJ Bring them along to a meeting or at least tell them about us. The ;ho knows0 maybe a file manager will make you more the merrier6 more efficient at the command line than you originall! thought6 3 The M22G .ur,e/ 6as Spo+en How would you rate your skill level 'he complete results from our recent online MUU With UNIX/Linux? surve! are now available to view at the link below. Absolute beginner 4% Beginner with some experience 21% A big T<A+F Y7U to the 2A members that parti- Intermediate 32% cipated and provided us feedback6 Advanced 43% ,ere are a few o* the interesting stats/ Where do you use UNIX/Linux? How long have you been a member? Home 29% 1 year or less 7% Work 4% 5 years or less 32% Home and work 68% 10 years or less 14% I do not use UNIX/Linux 0% More than 10 years 46% I am not a member 0% Which operating systems do you Use at home? Do you read the monthly Linux Desktop 75% Newsletter? Linux Server 36% Yes, always 61% BSD 14% Yes, most of the time 36% Windows 61% Rarely 4% Mac OS X 46% I do not receive the newsletter 0% Other 18% I did not know there was a newsl 0% None 0% How often do you attend the Which operating systems do you Monthly meeting? Use at work? Every month 29% Linux Desktop 57% More than five times a year 25% Linux Server 57% One to five times a year 36% BSD 7% I do not normally attend 11% Windows 57% Mac OS X 32% Coke or Pepsi Other 29% Coke 72% None 11% Pepsi 28% Who is your ISP? Do you explicitly set your Shaw 46% Repositories to the Muug server? MTS 18% LES.net 4% Yes 14% VOI 0% No 57% Prefer not to say 4% I use the mirror lists 29% Other, please specify..
Recommended publications
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Valami Commander Felhasználói És Fejlesztői Dokumentáció
    Tuska Balázs Valami Commander Felhasználói és Fejlesztői Dokumentáció Témavezető: Porkoláb Zoltán ELTE IK 2004 1 Tartalomjegyzék 1. Bevezető...............................................................................................................................4 1.1. A programról.................................................................................................................4 1.1.1. Motiváció és történet.............................................................................................5 1.1.2. Mire használható?.................................................................................................7 1.1.3. Mire nem használható?.........................................................................................7 1.2. Telepítés........................................................................................................................7 1.2.1. Követelmények és Ajánlások................................................................................7 1.2.2. A telepítés menete.................................................................................................8 2. Funkciók részletesen a felhasználók számára.......................................................................9 2.1. A fő ablak......................................................................................................................9 2.1.1. Panelek................................................................................................................10 2.1.2. A parancssor........................................................................................................11
    [Show full text]
  • Hwb: the Hardware Book (Offline)
    HwB: The Hardware Book (Offline) Welcome to the Hardware Book. Internet's largest free collection of connector pinouts and cable descriptions. Newsflash! A new version of The Hardware Book has been released as of 2001-06-08! See News for more details. This is an offline version, the latest release of HwB can be found at http://www.hardwarebook.net/. Connectors Pinouts for connectors, buses etc. Cables How to build serial cables and many other cables. Adapters How to build adapters. Circuits Misc circuits (active filters etc). Tables Misc tables with info. (AWG..) WWW Links Links to other electronic resources. News News information about The Hardware Book. Wanted Information we are currently looking for. About Who did this? And why? Comment Send your comments to the author. Copyright © The Hardware Book Team 1996-2001. May be copied and redistributed, partially or in whole, as apropriate. Document last modified: 2001-06-08 file:///C|/tmp/tech/HwB/index.html [6/14/2001 11:59:19 PM] HwB: Connector Menu (Offline) [ Audio/Video | Buses | Cartridges/Expansions | Cellular Phones | Memories | Misc | Networks | Parallel | PC | Power Supply | Serial | Storage | Mice/Keyboards/Joysticks ] What does the information that is listed for each connector mean? See the tutorial. Audio/Video Audio ActionMedia 2 Audio/Video Capture Amiga 1000 RF Monitor Apple AudioVision CBM 1902A NeoGeo Audio/Video Sony RGB Multi Input TI-99/4A Video/Audio Consoles Atari Jaguar A/V N64 Video PlayStation A/V Sega Dreamcast A/V Sega Genesis 2/32X/Nomad A/V Sega Genesis/Master
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Metadefender Core V4.17.3
    MetaDefender Core v4.17.3 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of MetaDefender Core 14 1. Quick Start with MetaDefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Process Files with MetaDefender Core 21 2. Installing or Upgrading MetaDefender Core 22 2.1. Recommended System Configuration 22 Microsoft Windows Deployments 22 Unix Based Deployments 24 Data Retention 26 Custom Engines 27 Browser Requirements for the Metadefender Core Management Console 27 2.2. Installing MetaDefender 27 Installation 27 Installation notes 27 2.2.1. Installing Metadefender Core using command line 28 2.2.2. Installing Metadefender Core using the Install Wizard 31 2.3. Upgrading MetaDefender Core 31 Upgrading from MetaDefender Core 3.x 31 Upgrading from MetaDefender Core 4.x 31 2.4. MetaDefender Core Licensing 32 2.4.1. Activating Metadefender Licenses 32 2.4.2. Checking Your Metadefender Core License 37 2.5. Performance and Load Estimation 38 What to know before reading the results: Some factors that affect performance 38 How test results are calculated 39 Test Reports 39 Performance Report - Multi-Scanning On Linux 39 Performance Report - Multi-Scanning On Windows 43 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3.
    [Show full text]
  • Metod LR OS 09.03.02 2020
    МИНИCTEPCTBO НАУКИ И ВЫСШЕГО ОБРАЗОВАНИЯ РОССИЙСКОЙ ФЕДЕРАЦИИ Федеральное государственное автономное образовательное учреждение высшего образования «СЕВЕРО-КАВКАЗСКИЙ ФЕДЕРАЛЬНЫЙ УНИВЕРСИТЕТ» Институт сервиса, туризма и дизайна (филиал) СКФУ в г. Пятигорске МЕТОДИЧЕСКИЕ УКАЗАНИЯ ПО ВЫПОЛНЕНИЮ ЛАБОРАТОРНЫХ РАБОТ ПО ДИСЦИПЛИНЕ «ОПЕРАЦИОННЫЕ СИСТЕМЫ» для студентов направления 09.03.02 Информационные системы и технологии Пятигорск, 2020 Методические указания предназначены для студентов направления 09.03.02 «Информационные системы и технологии» очной формы обучения и содержат материалы и задания для выполнения лабораторных работ по дисциплине «Операционные системы» Рассмотрено и утверждено на заседании кафедры Систем управления и информационных технологий протокол № ___ от _______________2020 Зав.кафедрой «Системы управления и информационные технологии» ____________________________ Першин И.М. Составитель: Доцент кафедры «Системы управления и информационные технологии» _____________________________ Мишин В.В. 2 СОДЕРЖАНИЕ Лабораторная работа №1 Работа с операционной системой MS DOS 4 Лабораторная работа №2 Работа с операционной системой MS Windows ХР. 14 Лабораторная работа №3 Настройка локальной сети в операционной системе MS Windows ХР. Лабораторная работа №4. Файловые менеджеры Total Commander и Far Manager 34 Лабораторная работа №5 Средства защиты информации в сети. 43 Лабораторная работа №6 Операционная система LINUX. 58 3 Лабораторная работа № 1 Работа с операционной системой MS DOS. Цель работы: освоить основные приемы работы с ОС MS-DOS Формируемые компетенции Индекс Формулировка: ОПК-5 Способен инсталлировать программное и аппаратное обеспечение для информационных и автоматизированных систем Способен осуществлять выбор платформ и инструментальных ОПК-7 программно-аппаратных средств для реализации информационных систем Теоретическая часть 1.Загрузка операционной системы MS-DOS Перейдем к лабораторной работе на персональном компьютере. Мы должны проверить, установлена ли на диске компьютера операционная система MS-DOS, и при необходимости установить ее.
    [Show full text]
  • LINUX: Rute User's Tutorial and Exposition
    LINUX: Rute User’s Tutorial and Exposition Paul Sheer August 14, 2001 Pages up to and including this page are not included by Prentice Hall. 2 “The reason we don’t sell billions and billions of Guides,” continued Harl, after wiping his mouth, “is the expense. What we do is we sell one Guide billions and billions of times. We exploit the multidimensional nature of the Universe to cut down on manufacturing costs. And we don’t sell to penniless hitchhikers. What a stupid notion that was! Find the one section of the market that, more or less by definition, doesn’t have any money, and try to sell to it. No. We sell to the affluent business traveler and his vacationing wife in a billion, billion different futures. This is the most radical, dynamic and thrusting business venture in the entire multidimensional infinity of space-time-probability ever.” ... Ford was completely at a loss for what to do next. “Look,” he said in a stern voice. But he wasn’t certain how far saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew.
    [Show full text]
  • New Telebots Backdoor: First Evidence Linking Industroyer to Notpetya
    10/14/2018 New TeleBots backdoor links Industroyer to NotPetya for first time (https://www.welivesecurity.com/) New TeleBots backdoor: First evidence linking Industroyer to NotPetya ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven Among the most significant malware-induced cybersecurity incidents in recent years were the attacks against the Ukrainian power grid (https://www.welivesecurity.com/2017/06/12/industroyer-biggest- threat-industrial-control-systems-since-stuxnet/) – which resulted in unprecedented blackouts two years in a row – and the devastating NotPetya ransomware outbreak (https://www.welivesecurity.com/2017/06/27/new-ransomware- attack-hits-ukraine/). Let’s take a look at the links between these major incidents. The first ever malware-enabled blackout in history, which happened in December 2015, was facilitated by the BlackEnergy malware toolkit (https://www.welivesecurity.com/2016/01/04/blackenergy-trojan- strikes-again-attacks-ukrainian-electric-power-industry/). ESET researchers have been following the activity (https://www.welivesecurity.com/2014/10/14/cve-2014-4114-details- august-blackenergy-powerpoint-campaigns/) of the APT group https://www.welivesecurity.com/2018/10/11/new-telebots-backdoor-linking-industroyer-notpetya/ 1/19 10/14/2018 New TeleBots backdoor links Industroyer to NotPetya for first time utilizing BlackEnergy both before and after this milestone event. After th(het t2p0s:1/5/w bwlawc.kwoeulivte, stehcuer igtyr.ocoump/ s) eemed to have ceased actively using BlackEnergy, and evolved into what we call TeleBots (https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing- disruptive-killdisk-attacks/).
    [Show full text]
  • Met MC(Chistovik)-New
    3 МІНІСТЕРСТВО ОСВІТИ І НАУКИ УКРАЇНИ Запорізький національний технічний університет МЕТОДИЧНІ ВКАЗІВКИ до виконання лабораторних робіт з дисципліни “Системне програмне забезпечення” для студентів спеціальності 123 “Комп’ютерна інженерія” усіх форм навчання частина 2 Файл-менеджери в операційній системі Linux 2018 PDF created with pdfFactory Pro tria3l version www.pdffactory.com 4 Методичні вказівки до виконання лабораторних робіт з дисципліни “Системне програмне забезпечення” для студентів спеціальності 123 “Комп’ютерна інженерія” усіх форм навчання частина 2. Файл-менеджери в операційній системі Linux /Укл. Т.О.Паромова, Т.М.Семерюк. - Запоріжжя: ЗНТУ, 2018.- 18с. Укладачі: Т.О.Паромова, ст.викладач, Т.М. Семерюк, асистент Рецензент: С.Ю.Скрупський, доцент, к.т.н. Відповідальний за випуск: Т.М. Семерюк, асистент Затверджено на засіданні кафедри “Комп’ютерні системи та мережі” Протокол № 8 від “ 25 ” квітня 2018р. Рекомендовано до видання НМК факультету комп’ютерних наук і технологій Протокол №9 від “ 27 ” квітня 2018р. PDF created with pdfFactory Pro trial version www.pdffactory.com 4 3 ЗМІСТ 1. ЗАГАЛЬНІ ВІДОМОСТІ ......................................................... 4 1.1. Загальна інформація про оболонку: ......................................... 4 1.2. Зовнішній вигляд екрану Midnight Commander: ...................... 4 1.3. Меню панелей: ......................................................................... 5 1.4. Управління панелями: ............................................................ 10 1.5. Функціональні клавіші:
    [Show full text]
  • „Operētājsistēmas” Mācību Materiāli
    IZGLĪTĪBAS UN ZINĀTNES MINISTRIJAS RĒZEKNES PROFESIONĀLĀ VIDUSSKOLA „OPERĒTĀJSISTĒMAS” MĀCĪBU MATERIĀLI SKOLOTĀJS: DAINIS SUSEJS RĒZEKNE , 2 0 0 7 2 Mācību materiāli izstrādāti Rēzeknes Profesionālajā vidusskolā, īstenojot ESF projektu „Profesionālās vidējās izglītības programmu „Viesnīcu serviss” un „Datorsistēmas” uzlabošana”, projekta identifikācijas Nr. VPD1/ESF/PIAA/04/APK/3.2.1./0028/0145, laikā no 07.11.2005. līdz 06.12.2007. Projektu administrēja valsts aģentūra „Profesionālās izglītības attīstības aģentūra” (līgums Nr. 2005/0266/VPD1/ESF/PIAA/04/APK/3.2.1./0028/0145). 3 Saturs Ievads ............................................................................................................................... 5 1. Operētājsistēmas (OS) jēdzieni ............................................................................. 6 1.1. OS klasifikācija ................................................................................................ 6 1.2. OS izvēles kritēriji un iegādes iespējas ............................................................. 7 1.2.1. Microsoft licences ........................................................................................ 7 1.2.2. Atklātais pirmkods ..................................................................................... 16 2. BIOS ..................................................................................................................... 18 Praktiskā darba uzdevumi ........................................................................................... 21 3. OS
    [Show full text]
  • CIT381 COURSE TITLE: File Processing and Management
    NATIONAL OPEN UNIVERSITY OF NIGERIA SCHOOL OF SCIENCE AND TECHNOLOGY COURSE CODE: CIT381 COURSE TITLE: File Processing and Management CIT381 COURSE GUIDE COURSE GUIDE CIT381 FILE PROCESSING AND MANAGEMENT Course Team Ismaila O. Mudasiru (Developer/Writer) - OAU NATIONAL OPEN UNIVERSITY OF NIGERIA ii CIT381 COURSE GUIDE National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salaam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published By: National Open University of Nigeria First Printed 2011 ISBN: 978-058-525-7 All Rights Reserved CONTENTS PAGE iii CIT381 COURSE GUIDE Introduction …………………..…………………………………… 1 What You Will Learn in this Course………………………………. 1 Course Aims ………………………………………………………. 2 Course Objectives …………………………………………………. 2 Working through this Course………………………….…………… 3 The Course Materials………………………………………………. 3 Study Units…………………………………………………………. 3 Presentation Schedule……………….……………………………… 4 Assessment…………………………………………………………. 5 Tutor-Marked Assignment…………………………………………. 5 Final Examination and Grading……………………………………. 6 Course Marking Scheme…………………………………………… 6 Facilitators/Tutors and Tutorials…………………………………… 6 Summary…………………………………………………………… 7 iv CIT381 FILE PROCESSING AND MANAGEMENT Introduction File Processing and Management is a second semester course. It is a 2- credit course that is available to students offering Bachelor of Science, B. Sc., Computer Science, Information Systems and Allied degrees. Computers can store information on several different types of physical media. Magnetic tape, magnetic disk and optical disk are the most common media. Each of these media has its own characteristics and physical organisation. For convenience use of the computer system, the operating system provides a uniform logical view of information storage. The operating system abstracts from the physical properties of its storage devices to define a logical storage unit, the file.
    [Show full text]