NE-55187C Linux System Administration Summary

Total Page:16

File Type:pdf, Size:1020Kb

NE-55187C Linux System Administration Summary NE-55187C Linux System Administration Summary Duration Level Technology Delivery Method Training Credits Non-Microsoft Products Classroom ILT 4 Days Beginner SATV and Technologies Virtual ILT Introduction This hands-on 4-day Linux System Administration course teaches attendees how to administer, configure and upgrade Linux systems running one of the three major Linux distribution families (Red Hat, SUSE, Debian/Ubuntu). Focused on enterprise environments, it provides Linux system administrators with all the ools and concepts needed to efficiently build and manage a production Linux infrastructure. This course presents state-of-the-art techniques used in the industry and applies them in the context of practical labs. Audience profile This course is intended for System administrators and users who already have at least some basic exposure to Linux or another UNIX-based operating system constitute the target audience for this class. Anyone who is looking to acquire practical knowledge in the field of system administration in enterprise environments will save significant time by attending this course. It should also be considered a necessary step to be taken by anyone considering more advanced classes in our System Administration curriculum track. The concepts covered provide important building blocks for anyone looking to attend more advanced classes, in particular LFS311: Linux Network Management. Prerequisites Before attending this course, students must have the following technical knowledge: • Knowledge of the basic components of Linux • Familiarity with text editors (emacs, VI) • Working knowledge of Bash scripting • Attendees should already have prior exposure to a Linux or UNIX system and practical experience with the command line interface at a level that is equivalent to what is covered in our free LFS101x - Introduction to Linux course (available on edX.org) • Basic tools such as text editors, file utilities and basic tasks are assumed to be well-understood prior to this course Course Objectives After completing this course, students will be able to: • Perform essential Linux commands such as installation, searches and manipulating files • Operate running Linux systems by managing the boot process, scheduling jobs, updating the system, monitoring system performance and managing security • Manage users and groups by adding/deleting/modifying, configuring LDAP and PAM, modifying user processes and resources • Ensure network performance via configuration, monitoring, tunnelling and routing of traffic • Configure services such as DNS, shares, SSH and SELinux/AppArmor as well as servers for DHCP and HTTP • Manage system storage by using partitions, logical volumes, phsyical volumes, ACLs, quotas and clustering Course Content Module 1: Introduction After completing this module, • FHS Linux Standard This module defines the students will be able to: Directory Tree organization responsible for Linux • Describe the mission of • root (/) directory and explains how it promotes, The Linux Foundation and • /bin protects, and advances Linux. its role in the Linux and • /dev Lessons: Open Source community • /etc • Linux Foundation • Configure the system for • /home • Linux Foundation Training safe use via the sudo • /lib and /lib64 • Linux Foundation command • /media Certifications • /mnt • Laboratory Exercises, Module 2: Linux Filesystem Tree • /opt Solutions and Resources Layout • /proc • E-Learning Course: This module explains how the Linux • /sys LFS201 Filesystem is organized and points • /root • Distribution Details out the key directories and their • /sbin Lab: Module 1 Labs roles. • /tmp • Configuring the System for Lessons • /usr sudo • Data Distinctions • /var • /run Lab: Module 2 Labs • Understand the role and • Stress your Linux system • Change size of the default function of package and monitor results directories management systems • Monitor the performance of • Touring the /proc Filesystem • Understand and use RPM drives and file systems After completing this module, • Understand and use DKPG students will be able to: • Understand the role of Module 7: Linux Filesystems • Describe how the Linux revision control systems, This module explains how to work Filesystem is set up particularly git with Linux Filesystems, starting with • Demonstrate knowledge of the understanding that Linux treats how the key directories Module 5: Package Installers everything as a file. IT covers Virtual work This module explains how to use the filesystem (VFS), Filesystem Usage major package installers, including and Attributes, Major types (ext4, Module 3: Processes yum, zypper and APT. It also XFS, btrfs) and how to create, This module explains how to work explains the role that package format, mount, swap and repair with Linux processes. It begins with installers play in automating Filesystems. an overview of what processes are software management and dealing Lessons and how they work before with dependencies. • Filesystem Basics proceeding to illustrate how to Lessons • Virtual Filesystem (VFS) create, monitor, prioritize and limit • Package Installers • Available Filesystems processes. • yum • Filesystem Concepts Lessons • zypper • Disk and Filesystem Usage • Programs and Processes • APT • Extended Attributes • Process Limits Lab: Module 5 Labs • ext4 • Creating Processes • Basic yum commands • XFS ** • Process States • Using yum to find • btrfs ** • Execution Modes information about a Lab: Module 7 Labs • Daemons package • Defragmenting a system • niceness • Managing groups of • Modifying Filesystem • Libraries packages with yum parameters using tune2fs • Signals • Adding a new yum • Working with file attributes Lab: Module 3 Labs repository • Mounting options • Controlling Processes with • Basic zypper commands • Managing swap space ulimit • Using zypper to find • Filesystem quotas • Examining System V IPC information about a • Working with XFS Activity package • Working with btrfs • Examining Signal Priorities • Basic APT commands After completing this module, and Execution • Using APT to find students will be able to: After completing this module, information about a • Create Filesystems students will be able to: package • Format Filesystems • Describe the role of • Managing groups of • Mount Filesystems processes in Linux and packages using APT • Use swap partitions how they relate to After completing this module, • Manage Filesystem quotas programs students will be able to: • Repair Filesystems • Identify the different states • Describe the role that processes can take package installers play in • Monitor and limit processes managing the software Module 8: Partitioning and • Set process priority using update process Formatting Disks niceness values • Demonstrate proficiency This module explains how to work with APT, yum and zipper with disks in Linux by naming, partitioning and sizing them. Module 4: Package Management Lessons Systems Module 6: System Monitoring • Common Disk Types This module explains how to This module explains how to work • Disk Geometry with the major package monitor your Linux system and use • Partitioning management systems used in Linux tools to test it and report any issues. • Naming Disk Devices distributions. Covers both RPM and Lessons DKPG as well as the use of version • System Monitoring • Sizing up partitions control systems such as git. • Process Monitoring • Partition table editors Lab: Module 8 Labs Lessons • Memory Monitoring and • Software Packaging Tuning • Using a file as a disk partition image Concepts • Network Monitoring • Partioning a Disk Image file • RPM (Red Hat Package • I/O Monitoring • Using losetup and parted Manager) • I/O Scheduling ** • Partitioning a real hard disk • DPKG (Debian Package) • System Log Files After completing this module, • Revision Control Systems • sar ** students will be able to: Lab: Module 4 Labs Lab: Module 6 Labs • Partition disks • Using RPM • Using stress • Name disk drives • Rebuilding the RPM • Processes • Size partitions database • Monitoring Process States • Edit partition tables • Using DKPG • Invoking the OOM Killer • Version control with git • bonnie++ After completing this module, • fs mark Module 9: More on Linux students will be able to: After completing this module, Filesystems students will be able to: This module expands on Module 8. • Creating Logical Volumes Docker as an example of container It explains how to create, format, After completing this module, technology. mount and check filesystems. students will be able to: Lessons Lessons • Understand, configure and • Containers • Creating and formatting monitor RAID • Docker filesystems • Create, resize and utilize • Docker Commands • Checking and Repairing Logical Volumes Lab: Module 14 Labs Filesystems • Work with LVM snapshots • Install and test Apache • Mounting filesystems (httpd) as a Docker • automount Module 12: Kernel Services and application • Swap Configuration After completing this module, • Filesystem Quotas ** This module explains how the Linux students will be able to: Lab: Module 9 Labs Kernel is configured, how the • Understand the basics of • Mounting Options modules and utilities work, the containers and container • Managing Swap Space function of sysctl and udev and applications • Filesystem Quotas Device Management. • Install and test a Docker After completing this module, Lessons application students will be able to: • Kernel Overview • Create and format a • Kernel Configuration Module 15: User and Group filesystem • sysctl Account Management • Repair a filesystem
Recommended publications
  • By Sebastiano Vigna and Todd M. Lewis Copyright C 1993-1998 Sebastiano Vigna Copyright C 1999-2021 Todd M
    ne A nice editor Version 3.3.1 by Sebastiano Vigna and Todd M. Lewis Copyright c 1993-1998 Sebastiano Vigna Copyright c 1999-2021 Todd M. Lewis and Sebastiano Vigna Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Chapter 1: Introduction 1 1 Introduction ne is a full screen text editor for UN*X (or, more precisely, for POSIX: see Chapter 7 [Motivations and Design], page 65). I came to the decision to write such an editor after getting completely sick of vi, both from a feature and user interface point of view. I needed an editor that I could use through a telnet connection or a phone line and that wouldn’t fire off a full-blown LITHP1 operating system just to do some editing. A concise overview of the main features follows: • three user interfaces: control keystrokes, command line, and menus; keystrokes and menus are completely configurable; • syntax highlighting; • full support for UTF-8 files, including multiple-column characters; • 64-bit
    [Show full text]
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • Practical C Programming, 3Rd Edition
    Practical C Programming, 3rd Edition By Steve Oualline 3rd Edition August 1997 ISBN: 1-56592-306-5 This new edition of "Practical C Programming" teaches users not only the mechanics or programming, but also how to create programs that are easy to read, maintain, and debug. It features more extensive examples and an introduction to graphical development environments. Programs conform to ANSI C. 0 TEAM FLY PRESENTS Table of Contents Preface How This Book is Organized Chapter by Chapter Notes on the Third Edition Font Conventions Obtaining Source Code Comments and Questions Acknowledgments Acknowledgments to the Third Edition I. Basics 1. What Is C? How Programming Works Brief History of C How C Works How to Learn C 2. Basics of Program Writing Programs from Conception to Execution Creating a Real Program Creating a Program Using a Command-Line Compiler Creating a Program Using an Integrated Development Environment Getting Help on UNIX Getting Help in an Integrated Development Environment IDE Cookbooks Programming Exercises 3. Style Common Coding Practices Coding Religion Indentation and Code Format Clarity Simplicity Summary 4. Basic Declarations and Expressions Elements of a Program Basic Program Structure Simple Expressions Variables and Storage 1 TEAM FLY PRESENTS Variable Declarations Integers Assignment Statements printf Function Floating Point Floating Point Versus Integer Divide Characters Answers Programming Exercises 5. Arrays, Qualifiers, and Reading Numbers Arrays Strings Reading Strings Multidimensional Arrays Reading Numbers Initializing Variables Types of Integers Types of Floats Constant Declarations Hexadecimal and Octal Constants Operators for Performing Shortcuts Side Effects ++x or x++ More Side-Effect Problems Answers Programming Exercises 6.
    [Show full text]
  • Standard TECO (Text Editor and Corrector)
    Standard TECO TextEditor and Corrector for the VAX, PDP-11, PDP-10, and PDP-8 May 1990 This manual was updated for the online version only in May 1990. User’s Guide and Language Reference Manual TECO-32 Version 40 TECO-11 Version 40 TECO-10 Version 3 TECO-8 Version 7 This manual describes the TECO Text Editor and COrrector. It includes a description for the novice user and an in-depth discussion of all available commands for more advanced users. General permission to copy or modify, but not for profit, is hereby granted, provided that the copyright notice is included and reference made to the fact that reproduction privileges were granted by the TECO SIG. © Digital Equipment Corporation 1979, 1985, 1990 TECO SIG. All Rights Reserved. This document was prepared using DECdocument, Version 3.3-1b. Contents Preface ............................................................ xvii Introduction ........................................................ xix Preface to the May 1985 edition ...................................... xxiii Preface to the May 1990 edition ...................................... xxv 1 Basics of TECO 1.1 Using TECO ................................................ 1–1 1.2 Data Structure Fundamentals . ................................ 1–2 1.3 File Selection Commands ...................................... 1–3 1.3.1 Simplified File Selection .................................... 1–3 1.3.2 Input File Specification (ER command) . ....................... 1–4 1.3.3 Output File Specification (EW command) ...................... 1–4 1.3.4 Closing Files (EX command) ................................ 1–5 1.4 Input and Output Commands . ................................ 1–5 1.5 Pointer Positioning Commands . ................................ 1–5 1.6 Type-Out Commands . ........................................ 1–6 1.6.1 Immediate Inspection Commands [not in TECO-10] .............. 1–7 1.7 Text Modification Commands . ................................ 1–7 1.8 Search Commands .
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • On Extended Regular Expressions
    On Extended Regular Expressions Benjamin Carle and Paliath Narendran Dept. of Computer Science University at Albany–SUNY Albany, NY 12222 Abstract. In this paper we extend the work of Campeanu, Salomaa and Yu [1] on extended regular expressions featured in the Unix utility egrep and the popular scripting language Perl. We settle the open issue of closure under intersection and provide an improved pumping lemma that will show that a larger class of languages is not recognizable by ex- tended regular expressions. We also investigate some questions regarding extended multi-pattern languages introduced by Nagy in [2]. 1 Introduction Grep, a well-known command line search utility, is used regularly on Unix and other operating systems to find matching lines in files or standard input. Grep uses regular expressions to match patterns, thereby allowing a user to quickly find important data in very large files or command output. Egrep, a variant of grep, uses extended regular expressions1 to increase the set of languages recognizable by the utility. Because the set of languages recognized by egrep is larger than that of theoretical regular expressions, it is important to understand the expressive power of this utility. In this paper we extend the pioneering work of [1]; we show that the family of languages recognizable by extended regular expressions is not closed under intersection, thereby settling an open problem. Furthermore, we introduce a different pumping lemma and use that lemma to show a class of languages that satisfy the pumping property of [1] but are not expressible by extended regular expressions. We also investigate some decidability and complexity issues.
    [Show full text]
  • Inet Intelligent Network Management (EN)
    Smart solutions for smart networks Version V48 INET INTELLIGENT NETWORK MANAGEMENT Features Description Web based application following design of thin client iNET, based on the scalable and modularized computing architecture, is a set of intelligent network management Windows style user desktop environment software programs which can be taken as both Element Management Layer (EML) and Network Management Supported browsers: Firefox; Internet Explorer (IE) Layer (NML) based the Telecommunications Supported server platform: MS Windows, Linux Management Network (TMN) model. This program is (CentOS) flexibly designed to manage your network regardless of Database server: MySQL RDBMS size or complexity. You can add or remove any component as you want without affecting operations of Multi-language support (upon request) the system. It provides a GUI (graphical user interface) Automatic load balancing for the major components to for the management of a communications network increase performance of iNET server containing CXR Telecom products. Hot standby server redundancy with automatic failover to The workforce management is facilitated by the multiple provide high availability(HA) for the major system levels of login security, which provides the network components manager great flexibility of work assignment. The System access security with role-based user access hierarchical grouping feature, cities, buildings, and control. The access privilege can be customized through rooms, allow rapid access to the desired network any combination of operation functions and managed element. NEs. User inherits privileges automatically from group All SNMP provided functions are available in iNET. This privilege includes the execution of all commands, the gathering of all statistics, and the display of all alarm conditions in real System operation and user access log time.
    [Show full text]
  • Introducing UNIX
    CHAPTER 2 – BECOMING FAMILIAR WITH UNIX COMMANDS Updated by: Eng. Rana AlQurem Command Basics Commands are mostly implemented as disk files which contains executable code Mainly written in C language Loaded to memory when invoked, then executed Commands are case sensitive Usually 4 characters or less UNIX Doesn’t require command names to have extension Some applications (not UNIX) require files to have extensions such as C and JAVA compilers The shell is a special command: runs continuously as long as you are logged UNIX provides a full-duplex terminal Separate channels for input/output Users do not have to wait for a command to complete before typing the next one; just continue typing even if the output of the previous command clutters the display The PATH: Locating Commands One of the most important environment variables is the path. It defines where the shell looks for commands. Set to a colon-delimited list of directories Shell looks at PATH only when command is not used with a pathname and is also not a shell built-in. To see the path value, type “echo $PATH” Ex: echo $PATH /usr/local/bin:/usr/bin:/usr/ccs/bin:/usr/ucb:/usr/dt/bin:/bi:. Common Directories /bin This is the directory where you typically find essential user commands such as ls and man. /usr/bin Holds most of the common user commands and basic applications /usr/local/bin Holds commands that are local to the current machine and are not common amongst machines. May not be used. $HOME/bin Where you should store any executable programs that you create.
    [Show full text]
  • Editor War - Wikipedia, the Free Encyclopedia Editor War from Wikipedia, the Free Encyclopedia
    11/20/13 Editor war - Wikipedia, the free encyclopedia Editor war From Wikipedia, the free encyclopedia Editor war is the common name for the rivalry between users of the vi and Emacs text editors. The rivalry has become a lasting part of hacker culture and the free software community. Many flame wars have been fought between groups insisting that their editor of choice is the paragon of editing perfection, and insulting the others. Unlike the related battles over operating systems, programming languages, and even source code indent style, choice of editor usually only affects oneself. Contents 1 Differences between vi and Emacs 1.1 Benefits of vi-like editors 1.2 Benefits of Emacs 2 Humor 3 Current state of the editor war 4 See also 5 Notes 6 References 7 External links Differences between vi and Emacs The most important differences between vi and Emacs are presented in the following table: en.wikipedia.org/wiki/Editor_war 1/6 11/20/13 Editor war - Wikipedia, the free encyclopedia vi Emacs Emacs commands are key combinations for which modifier keys vi editing retains each permutation of typed keys. are held down while other keys are Keystroke This creates a path in the decision tree which pressed; a command gets executed execution unambiguously identifies any command. once completely typed. This still forms a decision tree of commands, but not one of individual keystrokes. Historically, vi is a smaller and faster program, but Emacs takes longer to start up (even with less capacity for customization. The vim compared to vim) and requires more version of vi has evolved to provide significantly memory.
    [Show full text]
  • Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1
    Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1. December 2020 Chet Ramey, Case Western Reserve University Brian Fox, Free Software Foundation This text is a brief description of the features that are present in the Bash shell (version 5.1, 21 December 2020). This is Edition 5.1, last updated 21 December 2020, of The GNU Bash Reference Manual, for Bash, Version 5.1. Copyright c 1988{2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 What is Bash?:::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 What is a shell? :::::::::::::::::::::::::::::::::::::::::::::::: 1 2 Definitions ::::::::::::::::::::::::::::::::::::::: 3 3 Basic Shell Features ::::::::::::::::::::::::::::: 5 3.1 Shell Syntax :::::::::::::::::::::::::::::::::::::::::::::::::::: 5 3.1.1 Shell Operation :::::::::::::::::::::::::::::::::::::::::::: 5 3.1.2 Quoting ::::::::::::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.1 Escape Character ::::::::::::::::::::::::::::::::::::: 6 3.1.2.2 Single Quotes ::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.3 Double Quotes ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • RIDGE ROS Text Editing Guide
    ROS Text Editing Guide RIDGE 9051 'A ROS Text Editing Guide RIdge Computers Santa Clara, CA first edition: 9051 (SEP 84) © Copyright 1984, Ridge Computers. All rights reserved. Printed in the U.S.A. PUBLICATION HISTORY Manual TItle: ROS Text Editing Guide first editon: 9051 (SEP 84) NonCE No part of this document may be translated, reproduced, or copied in any form or by any means without the written permission of Ridge Computers. The information contained in this document is subject to change without notice. Ridge Computers shall not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. ACKNOWLEDGEMENT This software and documentation is based in part on the fourth Berkeley Software Distribution, under license from the regents of the University of California. We acknowledge the following individuals for their part in its development: Ken Arnold, Rick Blau, Earl Cohen, Robert Corbett, John Foderaro, Mark Horton, Bill Joy, Randy King, Jim Kleckner, Steve Levine, Colin McMaster, Geoffrey Peck, Rob Pike, Eric Scott, and Eric Shienbrood. These tutorial guides are based on documents created at Bell Laboratories to describe UNIX System software, and at the University of California, Berkeley, to describe bsd 4.2. Credits are given on the first page of each document contained in this volume. Some text has been changed to more accurately describe Ridge Computers' implementation of the software. Inappropriate material may have been deleted. UNIX is a trademark of Bell Laboratories. -ii- 9051 PREFACE The ROS Text Editing Guide (manual 9051) is a collection of tutorial documents on text,.
    [Show full text]
  • Linux Shell Scripting Tutorial
    Linux Shell Scripting Tutorial Linux Shell Scripting Tutorial Ver. 1.0 Written by Vivek G Gite I N D E X ● Introduction ❍ Kernel ❍ Shell ❍ How to use Shell ❍ Common Linux Command Introduction ● Process ❍ Why Process required ❍ Linux commands related with process ● Redirection of Standard output/input ❍ Redirectors ❍ Pipes ❍ Filters ● Shell Programming ❍ Variables in Linux ❍ How to define User defined variables ❍ Rules for Naming variable name ❍ How to print or access value of UDV (User defined variables) ❍ How to write shell script ❍ How to Run Shell Scripts ❍ Quotes in Shell Scripts http://www.freeos.com/guides/lsst/index.htm (1 of 2) [17/08/2001 17.41.52] Linux Shell Scripting Tutorial ❍ Shell Arithmetic ❍ Command Line Processing (Command Line Arguments) ❍ Why Command Line arguments required ❍ Exit Status ❍ Filename Shorthand or meta Characters (i.e. wild cards) ● Programming Commands ❍ echo command ❍ Decision making in shell script ( i.e. if command) ❍ test command or [ expr ] ❍ Loop in shell scripts ❍ The case Statement ❍ The read Statement ● More Advanced Shell Script Commands ❍ /dev/null - Use to send unwanted output of program ❍ Local and Global Shell variable (export command) ❍ Conditional execution i.e. && and || ❍ I/O Redirection and file descriptors ❍ Functions ❍ User Interface and dialog utility ❍ trap command ❍ getopts command ❍ More examples of Shell Script (Exercise for You :-) © 1998-2000 FreeOS.com (I) Pvt. Ltd. All rights reserved. http://www.freeos.com/guides/lsst/index.htm (2 of 2) [17/08/2001 17.41.52] Linux Shell Script Tutorial Introduction This tutorial is designed for beginners only and This tutorial explains the basics of shell programming by showing some examples of shell programs.
    [Show full text]