Michael Wrzaczek Dept of Biosciences, Plant Biology Viikki Plant Science Centre (Vips) University of Helsinki, Finland

Total Page:16

File Type:pdf, Size:1020Kb

Michael Wrzaczek Dept of Biosciences, Plant Biology Viikki Plant Science Centre (Vips) University of Helsinki, Finland Michael Wrzaczek Dept of Biosciences, Plant Biology Viikki Plant Science Centre (ViPS) University of Helsinki, Finland November 11th, 2015 Why learn and use Unix http://stein.cshl.org/genome_informatics/unix1/why_unix.html Bioinformatics tools built on Unix Why learn and use Unix simple I/O system good programming tools building block approach to programming many text manipulation programmes easy networking (integrated networking) are lazy Why learn and use Unix Unix is very powerful Many tools run on Unix Majority of web services run on Unix What is Unix... UNIX operating system 70ies, Bell Laboratories 1969: UNIX in Assembler code (Ken Thompson) 1972-1974: re-implementation in C (Ken Thompson and Dennis Ritchie) Until 1979: UNIX source code free, and freely distributed Early 80 The Unix-Philosophy Write computer programmes so, that they do one thing, but they do that one thing well. The Unix-Philosophy Write programmes in a way, so that they can work together. The Unix-Philosophy Write programmes in a way, that they use text files, since that is a univeral interface. (Douglas McIlroy) The Unix-Philosophy Due to the history of UNIX, ease of use/userfriendlyness was not one of the prime goals. UNIX was an operating system to develop a system for geeks. The Unix-Philosophy According to Eric S. Raymond Unix-Philosophies can be summed up as The Unix-Philosophy Mike Gancarz, 9 paramount precepts: 1. Small is beautiful 2. Make each programme do one thing well 3. Build a prototype as soon as possible 4. Choose portability over efficiency 5. Store data in flat text files 6. Use software leverage to your advantage 7. Use shell scripts to increase leverage and portability 8. Avoid captive user interfaces 9. Make every programme a filter The Unix-Philosophy 10 lesser tenets (not universally agreed upon): 1. Allow the user to tailor the environment 2. Make operating system kernels small and lightweight 3. User lowercase and keep it short 4. Save trees 5. Silence is golden 6. Think parallel 7. The sum of the parts is greater than the whole 8. Look for the 90 percent solution 9. Worse is better (simplicity over perfection!) 10.Think hierarchically Unix makes it easy and efficient to customize create from scratch connect (workflow automation) Since many flavours of Unix are open-source, it is very easy to take existing code/programmes and modify them according to the specific requirements. (POSIX-compliant) AIX, IRIX, Solaris, Mac Os X (not certified as POSIX-compliant) GNU, Minix, BSD, Linux Posix standard: standardized application level interface for Unix. While AIX, IRIX, Solaris, Mac Os X are posix compliant, Linux and the BSDs are not Posix-certified but generally comply with the standards. Plain and simple, the Posix standard makes it possible, to write a new operating system which is fully compatible with other Unix systems, by sticking to these specifications. So, what is Linux? kernel of the GNU/Linux operating system operating system -> distribution -compatible free operating system. -user ready, Linux-kernel is used. The kernel is the central component of most computer operating Systems. Amongst other things it regulates the communication Between soft- and hardware and also between processes. kernel of the GNU/Linux operating system software required (to interact with the computer.) Linux distributions kernel + additional software + package manager for simple software installation and removal Note that also many things run Linux where you might not be aware of, eg. Routers, PDAs, etc freely available on the net Pay for company-support Information: discussion forums newsgroups The community is generally very helpful in solving Some GNU/Linux Distributions: Ubuntu (http://www.ubuntulinux.org) Debian Gnu/Linux (http://www.debian.org) openSUSE (Novell SUSE Linux Desktop; http://www.opensuse.org) Fedora (Red Hat; http://www.fedoraproject.org) Slackware Linux (http://www.slackware.org) Gentoo GNU/Linux (http://www.gentoo.org) Mandriva Linux (formerly Mandrake; http://www.mandriva.com) Which version of Linux is right for me? Depends on use and taste. Arch, Debian, Gentoo, Slackware, etc Suse, Redhat - Communication with Unix You talk directly to the operating system You to a programme, that communicates with Unix or communicates with another programme that communicates with Unix What kinds of programmes can you talk to? a shell an interactive command a Graphical User Interface (GUI) tty . That comes from the teletypes that were originally used to interact with the operating system Note: Technically any software that allows the user to interact with a computer is a shell. A GUI is a shell just like a terminal. However, usually the command-line interpreter (or terminal) is referred to as shell. Communication with Unix User user commands interactive and data commands hand down input as well as output output prompt output Shell transfer cat ls vi adb built-in commands of control requests for services Kernel and Device Drivers The Unix Shell PROGRAMMING LANGUAGE! Shell scripts are not compiled (=translated into binaries, the machine understandable format) but interpreted at runtime INTERPRETED LANGUAGE Shell scripts are very powerful, but more sophisticated alternatives exist. We will see Perl and Python later in the course. The Unix shell Different types Thompson Shell (osh; the original UNIX shell), Bourne Shell (sh), C-Shell (csh) Korn Shell (ksh), Bourne Again Shell (bash), Z Shell (zsh) -in commands (eg. cd) Which shell are you running? michael@infocalypse ~ $ grep wrzaczek /etc/passwd michael:x:1007:100::/home/michael:/bin/bash michael@infocalypse ~ $ echo $SHELL /bin/bash michael@infocalypse ~ $ The Unix shell few helpful things CASE SENSITIVE! trying to open a file or using a command will not work if you mix upper- and lowercase letters. Commonly, all commands use lowercase letters while options and - or lower-case. The Unix shell few helpful things Tab completion typing the first few letters and then hitting the TAB key will complete the command/filename. If there are still several possibilities, when you press TAB a second time you will be presented with a list of appropriate commands/filenames. Type and press TAB TAB. This will give you all commands starting with CO. Pathnames locate files and directories in a Unix filesystem File extensions usually do not identify a file (there are a few exceptions!!!) Access to files is based on the concept of users and groups Every user has a unique account with a unique ID number (UID) Users are members of one or more groups Users and groups can efficiently be used to restrict or allow access to files depending on requirements wrzaczek@kasbi31 ~ $ cd / wrzaczek@kasbi31 / $ ls -l total 72 drwxr-xr-x 26 root root 4096 2007-11-09 13:20 home drwxr-xr-x 2 root root 4096 2008-01-29 10:10 bin drwxr-xr-x 2 root root 29 2005-06-09 14:43 boot drwxr-xr-x 14 root root 13180 2008-01-31 16:09 dev drwxr-xr-x 84 root root 8192 2008-02-03 19:08 etc drwxr-xr-x 26 root root 4096 2007-11-09 13:20 home drwxr-xr-x 9 root root 8192 2008-01-29 10:10 lib drwxr-xr-x 2 root root 33 2008-01-29 12:24 media drwxr-xr-x 9 root root 106 2006-03-13 19:21 mnt drwxr-xr-x 13 root root 4096 2007-08-10 17:44 opt dr-xr-xr-x 93 root root 0 2008-01-31 16:08 proc drwx------ 17 root root 4096 2008-02-03 19:07 root drwxr-xr-x 2 root root 8192 2008-01-29 12:24 sbin drwxr-xr-x 11 root root 0 2008-01-31 16:08 sys drwxrwxrwt 6 root root 4096 2008-02-03 20:20 tmp drwxr-xr-x 14 root root 4096 2007-11-02 01:01 usr drwxr-xr-x 14 root root 4096 2006-09-15 20:40 var wrzaczek@kasbi31 / $ Inside a Unix system... Enter the command df h Unix system harddisks Partition harddisks mount Directory will point to the assigned harddisk is the attaching of an additional filesystem to the currently accessible filesystem of a computer. You can tell your computer to add a new filesystem (a partition on a harddisk, a CD, a DVD, a USB stick etc) to the system and point to it from a folder on the already existing filesystem. The command cd (change directory) moves you around the tree. cd without any options takes you to your home directory. cd / takes you to the root level (=the most basal part of The filesystem) NOTE: root can mean different things root: the superuser account of the system root: the home directory of the root user root: the basal level on the filesystem indicated When you log in to your linux machine you find yourself in your HOME directory. michael@infocalypse ~ $ cd / michael@infocalypse / $ ls -l total 72 Type drwxr-xr-x 2 root root 4096 2008-01-29 10:10 bin drwxr-xr-x 2 root root 29 2005-06-09 14:43 boot drwxr-xr-x 14 root root 13180 2008-01-31 16:09 dev cd / drwxr-xr-x 84 root root 8192 2008-02-03 19:08 etc drwxr-xr-x 26 root root 4096 2007-11-09 13:20 home to go to drwxr-xr-x 9 root root 8192 2008-01-29 10:10 lib the lowest level of the drwxr-xr-x 2 root root 33 2008-01-29 12:24 media drwxr-xr-x 9 root root 106 2006-03-13 19:21 mnt filesystem. drwxr-xr-x 13 root root 4096 2007-08-10 17:44 opt dr-xr-xr-x 93 root root 0 2008-01-31 16:08 proc drwx------ 17 root root 4096 2008-02-03 19:07 root Unix: drwxr-xr-x 2 root root 8192 2008-01-29 12:24 sbin drwxr-xr-x 11 root root 0 2008-01-31 16:08 sys single-root hierarchical drwxrwxrwt 6 root root 4096 2008-02-03 20:20 tmp file system.
Recommended publications
  • It's Complicated but It's Probably Already Booting Your Computer
    FAQ SYSTEMD SYSTEMD It’s complicated but it’s probably already booting your computer. dynamically connect to your network, a runlevel of 1 for a single-user mode, GRAHAM MORRISON while syslogd pools all the system runlevel 3 for the same command messages together to create a log of prompt we described earlier, and Surely the ‘d’ in Systemd is everything important. Another daemon, runlevel 5 to launch a graphical a typo? though it lacks the ‘d’, is init – famous environment. Changing this for your No –it’s a form of Unix notation for being the first process that runs on next boot often involved editing the used to signify a daemon. your system. /etc/inittab file, and you’d soon get used to manually starting and stopping You mean like those little Isn’t init used to switch your own services simply by executing devils inhabiting Dante’s between the command-line the scripts you found. underworld? and the graphical desktop? There is a link in that Unix usage For many of us, yes. This was the You seem to be using the past of the term daemon supposedly main way of going from the tense for all this talk about the comes from Greek mythology, where desktop to a command line and back init daemon… daemons invisibly wove their magic again without trying to figure out which That’s because the and benign influence. The word is today processes to kill or start manually. aforementioned Systemd wants more commonly spelt ‘demon’, which Typing init 3 would typically close any to put init in the past.
    [Show full text]
  • Release Notes (100 001420)
    VERITAS File System™ 3.3.3 Release Notes Solaris January 2000 100-001420 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. Copyright Copyright © 2000 VERITAS Software Corporation. All rights reserved. VERITAS is a registered trademark of VERITAS Software Corporation in the US and other countries. The VERITAS logo and VERITAS File System are trademarks of VERITAS Software Corporation. All other trademarks or registered trademarks are the property of their respective owners. Printed in the USA, January 2000. VERITAS Software Corporation 1600 Plymouth St. Mountain View, CA 94043 Phone 650–335–8000 Fax 650–335–8050 www.veritas.com VERITAS File System Release Notes This guide provides information on VERITAS File System™ (VxFS) Release 3.3.3 for Solaris 2.5.1, Solaris 2.6, Solaris 7 (32-bit and 64-bit), and Solaris 8 (32-bit and 64-bit) operating systems. References in this document to VxFS 3.3 regarding new features, end of product support, compatibility, and software limitations apply to VxFS 3.3.3. Review this entire document before installing VxFS. The VERITAS File System packages include VxFS software, documentation,
    [Show full text]
  • Getting to Grips with Unix and the Linux Family
    Getting to grips with Unix and the Linux family David Chiappini, Giulio Pasqualetti, Tommaso Redaelli Torino, International Conference of Physics Students August 10, 2017 According to the booklet At this end of this session, you can expect: • To have an overview of the history of computer science • To understand the general functioning and similarities of Unix-like systems • To be able to distinguish the features of different Linux distributions • To be able to use basic Linux commands • To know how to build your own operating system • To hack the NSA • To produce the worst software bug EVER According to the booklet update At this end of this session, you can expect: • To have an overview of the history of computer science • To understand the general functioning and similarities of Unix-like systems • To be able to distinguish the features of different Linux distributions • To be able to use basic Linux commands • To know how to build your own operating system • To hack the NSA • To produce the worst software bug EVER A first data analysis with the shell, sed & awk an interactive workshop 1 at the beginning, there was UNIX... 2 ...then there was GNU 3 getting hands dirty common commands wait till you see piping 4 regular expressions 5 sed 6 awk 7 challenge time What's UNIX • Bell Labs was a really cool place to be in the 60s-70s • UNIX was a OS developed by Bell labs • they used C, which was also developed there • UNIX became the de facto standard on how to make an OS UNIX Philosophy • Write programs that do one thing and do it well.
    [Show full text]
  • Introducing Windows Azure for IT Professionals
    Introducing Windows ServerIntroducing Release 2012 R2 Preview Introducing Windows Azure For IT Professionals Mitch Tulloch with the Windows Azure Team PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2013 Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2013949894 ISBN: 978-0-7356-8288-7 Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Book Support at [email protected]. Please tell us what you think of this book at http://www.microsoft.com/learning/booksurvey. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. The example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, email address, logo, person, place, or event is intended or should be inferred. This book expresses the author’s views and opinions. The information contained in this book is provided without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor
    [Show full text]
  • Shell Script & Advance Features of Shell Programming
    Kirti Kaushik et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.4, April- 2015, pg. 458-462 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 4, Issue. 4, April 2015, pg.458 – 462 RESEARCH ARTICLE Shell Script & Advance Features of Shell Programming Kirti Kaushik* Roll No.15903, CS, Department of Computer science, Dronacharya College of Engineering, Gurgaon-123506, India Email: [email protected] Jyoti Yadav Roll No. 15040, CS, Department of Applied Computer science, Dronacharya College of Engineering, Gurgaon-123506, India Email: [email protected] Kriti Bhatia Roll No. 15048, CS, Department of Applied Computer science, Dronacharya College of Engineering, Gurgaon-123506, India Email: [email protected] Abstract-- In this research paper, the idea of shell scripting and writing computer programs is examined and different parts of shell programming are likewise contemplated. A shell script is a PC system intended to be controlled by the UNIX shell which is a charge line translator. The different tongues of shell scripts are thought to be scripting dialects. Regular operations performed by shell scripts incorporate document control, program execution, and printing content. A shell script can give an advantageous variety ofa framework order where unique environment settings, charge alternatives, or post-transforming apply naturally, yet in a manner that permits the new script to still go about as a completely typical UNIX summon. The real ideas like Programming in the Borne and C-shell, in which it would be clarified that how shell programming could be possible in Borne and C-shell.
    [Show full text]
  • INTRAFIND Ifinder Technical Documentation
    iFinder Confluence Search Technical Documentation Version 5.4.1 Last edited: Dec 21, 2020 iFinder Confluence Search – Technical Documentation – 5.4.1 Copyright and Trademarks The information in this document is subject to change without notice. No part of this document may be copied, reproduced or transmitted in any form or means without the prior written permission of IntraFind. The document is intended for customers and their technical staff. IntraFind welcomes readers’ comments as part of the process of continuous development and improvement of the documentation. The information or statements given in this document concerning the suitability, capacity or performance of the mentioned hardware or software products cannot be considered binding. However, IntraFind has made all reasonable efforts to ensure that the instructions contained in the document are adequate and free of material errors and omissions. IntraFind’s liability for any errors in the document is limited to the documentary correction of errors. IntraFind will not be responsible in any event for errors in this document or for any damages, incidental or consequential, including monetary loss, that might arise from the use of this document or the information in it. This document and the product it describes are considered protected by copyright according to applicable laws. © 2020 All rights reserved All brand names, product names and trademarks are the property of their respective owners. IntraFind Software AG Landsberger Straße 368 80687 Munich Germany Phone: +49 89 3090446-0
    [Show full text]
  • Absolute BSD—The Ultimate Guide to Freebsd Table of Contents Absolute BSD—The Ultimate Guide to Freebsd
    Absolute BSD—The Ultimate Guide to FreeBSD Table of Contents Absolute BSD—The Ultimate Guide to FreeBSD............................................................................1 Dedication..........................................................................................................................................3 Foreword............................................................................................................................................4 Introduction........................................................................................................................................5 What Is FreeBSD?...................................................................................................................5 How Did FreeBSD Get Here?..................................................................................................5 The BSD License: BSD Goes Public.......................................................................................6 The Birth of Modern FreeBSD.................................................................................................6 FreeBSD Development............................................................................................................7 Committers.........................................................................................................................7 Contributors........................................................................................................................8 Users..................................................................................................................................8
    [Show full text]
  • Classification of Chemicals
    Classification of Chemicals Flame & Detonation Arrester Specifications PROTECTOSEAL ® The Protectoseal Company recommends that the National Butadiene would qualify as a Group D material. In each of Electric Code (NEC) Article 500, rankings of various chemi - these cases, the chemicals were primarly listed in a higher cals be used, whenever possible, to determine the suitability category (Group B), because of relatively high pressure read - of a detonation arrester for use with a particular chemical. ings noted in one phase of the standard test procedure con - When no NEC rating of the particular chemical is available, ducted by Underwriters Laboratories. These pressures were the International Electrotechnical Commission (IEC) classifica - of concern when categorizing the chemicals because these tion (Groups IIA, IIB and IIC) is recommended as a secondary NEC groupings are also used as standard indicators for the source of information for determining the suitability of an ar - design strength requirements of electrical boxes, apparatus, rester for its intended service. In general, the IEC Group IIA is etc. that must withstand the pressures generated by an igni - equivalent to the NEC Group D; the IEC Group IIB is equiva - tion within the container. It should be noted that, in each of lent to the NEC Group C; and the IEC Group IIC includes these cases, the test pressures recorded were significantly chemicals in the NEC Groups A and B. In the event of a dis - lower than those commonly encountered when testing a deto - crepancy between the NEC and the IEC ratings, Protectoseal nation arrester for its ability to withstand stable and over - recommends that the NEC groups be referenced.
    [Show full text]
  • If Data Is Confidential and Available but Altered Decryption of Altered Data Usually Gives Garbage Exception: Electronic-Codeboo
    38 40 If Data is Confidential and Available but Altered Encryption • do not use ECB–Mode • use CBC– or CTR–mode (recommendation Schneier/Ferguson) • use AES or one of the finalists – Twofish (Schneier, Ferguson, Kelsey, Whiting, Wagner, Hall) decryption of altered data usually gives garbage – Serpent (Anderson, Biham, Knudsen) – MARS (Coppersmith et al., IBM) exception: electronic-codebook-mode (ECB) (uses independent blocks) – RC6 (Rivest, patented by RSA) 39 41 ECB-Mode Encrypted Penguin If Data is Non-Alterable and Confidential but not Available ,,Your message with authenticator 08931281763e1de003e5f930c449bf791c9f0db6 encryption is block by block has been received, but unfortunately the server is down. ❀ every block gets another color Your mail-service will never be accessible.” Example: lavabit.com, Snowden’s e-Mail-Provider 42 44 Authorization: Who is Allowed to Do All This? Problem: Person/Process/Role ⇐⇒ String (2) How to link a person to a string? • Person knows something (password, secret cryptographic key). • Person has something (token, USB–key, chipcard). Authorized entities only. • Person is something (biometrics, fingerprint etc.). Only Bob is allowed to enter here. We have to identify persons, processes and their roles. 43 45 Problem: Person/Process/Role ⇐⇒ String (1) Proof of Identity is Called Authentication Person identified by picture String identified by equality relation. 46 48 Proof of Identity: Links Person to a String Third party guarantees real identity. Has something: ID–card. 47 49 Proof of True Source is Called Authenticity
    [Show full text]
  • Bachelor Thesis Memory Management for Interactive Bitmap Image
    University of West Bohemia Faculty of Applied Sciences Department of Computer Science and Engineering Bachelor Thesis Memory Management For Interactive Bitmap Image Manipulation Pilsen 2011 Luk´aˇsJirkovsk´y Declaration I hereby declare that this bachelor thesis is completely my own work and that I used only the cited sources. Pilsen, May 9, 2011 Luk´aˇsJirkovsk´y Abstract Bitmap image manipulation is known to require a lot of memory. With the advance in lossless image manipulation, this weakness is becoming even more apparent. To keep memory requirements low, processing on demand is often used. Although this approach reduces memory use, it also requires more time for a chain of operations to be applied. To solve this problem, many applications add cache to specific positions in a pipeline, so it is not necessary to recalculate all operations with every change. This thesis presents a library for lossless image manipulation, using a new concept of memory management. The algorithm implemented tries to achieve a good balance between a memory usage and interactivity by assigning time limits for a chain of succeeding operations. This allows sharing of cache between multiple operations, if the sum of their run time does not exceed the time limit. The time limits are dynamically updated to reflect changes to operations which are applied on the image. Contents 1 Introduction 1 2 Bitmap Image Manipulation 2 2.1 On-Demand Processing . 2 2.2 Mipmapping............................ 2 2.3 Chaining of Operations . 3 2.4 Cache Management . 3 3 Existing Image Manipulation Libraries 5 3.1 VIGRA . 5 3.2 VIPS .
    [Show full text]
  • [11] Case Study: Unix
    [11] CASE STUDY: UNIX 1 . 1 OUTLINE Introduction Design Principles Structural, Files, Directory Hierarchy Filesystem Files, Directories, Links, On-Disk Structures Mounting Filesystems, In-Memory Tables, Consistency IO Implementation, The Buffer Cache Processes Unix Process Dynamics, Start of Day, Scheduling and States The Shell Examples, Standard IO Summary 1 . 2 INTRODUCTION Introduction Design Principles Filesystem IO Processes The Shell Summary 2 . 1 HISTORY (I) First developed in 1969 at Bell Labs (Thompson & Ritchie) as reaction to bloated Multics. Originally written in PDP-7 asm, but then (1973) rewritten in the "new" high-level language C so it was easy to port, alter, read, etc. Unusual due to need for performance 6th edition ("V6") was widely available (1976), including source meaning people could write new tools and nice features of other OSes promptly rolled in V6 was mainly used by universities who could afford a minicomputer, but not necessarily all the software required. The first really portable OS as same source could be built for three different machines (with minor asm changes) Bell Labs continued with V8, V9 and V10 (1989), but never really widely available because V7 pushed to Unix Support Group (USG) within AT&T AT&T did System III first (1982), and in 1983 (after US government split Bells), System V. There was no System IV 2 . 2 HISTORY (II) By 1978, V7 available (for both the 16-bit PDP-11 and the new 32-bit VAX-11). Subsequently, two main families: AT&T "System V", currently SVR4, and Berkeley: "BSD", currently 4.4BSD Later standardisation efforts (e.g.
    [Show full text]
  • UNIX (Solaris/Linux) Quick Reference Card Logging in Directory Commands at the Login: Prompt, Enter Your Username
    UNIX (Solaris/Linux) QUICK REFERENCE CARD Logging In Directory Commands At the Login: prompt, enter your username. At the Password: prompt, enter ls Lists files in current directory your system password. Linux is case-sensitive, so enter upper and lower case ls -l Long listing of files letters as required for your username, password and commands. ls -a List all files, including hidden files ls -lat Long listing of all files sorted by last Exiting or Logging Out modification time. ls wcp List all files matching the wildcard Enter logout and press <Enter> or type <Ctrl>-D. pattern Changing your Password ls dn List files in the directory dn tree List files in tree format Type passwd at the command prompt. Type in your old password, then your new cd dn Change current directory to dn password, then re-enter your new password for verification. If the new password cd pub Changes to subdirectory “pub” is verified, your password will be changed. Many systems age passwords; this cd .. Changes to next higher level directory forces users to change their passwords at predetermined intervals. (previous directory) cd / Changes to the root directory Changing your MS Network Password cd Changes to the users home directory cd /usr/xx Changes to the subdirectory “xx” in the Some servers maintain a second password exclusively for use with Microsoft windows directory “usr” networking, allowing you to mount your home directory as a Network Drive. mkdir dn Makes a new directory named dn Type smbpasswd at the command prompt. Type in your old SMB passwword, rmdir dn Removes the directory dn (the then your new password, then re-enter your new password for verification.
    [Show full text]