KET/KTL: Shell -- 2020

Total Page:16

File Type:pdf, Size:1020Kb

KET/KTL: Shell -- 2020 KET/KTL 2020 Introduction to the Shell Command Language and Standard Tools Overview with Examples Jan Bělohoubek Aims of this Lecture 3 Command Line Interface – CLI 1 Aims of this Lecture Motivation (Anketa) 4 (Our) BASH Reference 2 Unix Operating Systems 1/26 Aims of this Lecture Motivation (Anketa) provide an overview on "classical" engineering SW tools no more "What is this?" ! hands on . but gently our time is limited speed-up the learning curve as you will face it Area/Tool GNU/Linux CLI Scripting VCS Make SSH Embedded SW maybe probably of course of course of course maybe Application SW maybe probably of course of course of course probably Digital Design probably probably of course of course probably probably PCB Design maybe maybe probably of course maybe maybe Mechanical maybe maybe maybe probably rather not rather not Design Research+1 of course of course of course of course of course of course 1Simulations, Supercomputing, Networking, Control, AI . 1/26 Unix Operating Systems Linux Distributions Popular in Industry 1 Aims of this Lecture (EDA) Linux Distributions 2 Unix Operating Systems Popular for Home Use Brief History Unix/Linux 3 Command Line Interface – Surprising/New Features CLI How To Start . for Windows Users 4 (Our) BASH Reference 2/26 Unix Operating Systems Brief History Image source: https://en.wikipedia.org/wiki/History_of_Unix 1969 Unnamed PDP-7 operating system 1969 Open source 1971 to 1973 Unix 1971 to 1973 Version 1 to 4 Mixed/shared source 1974 to 1975 Unix 1974 to 1975 Closed source Version 5 to 6 PWB/Unix 1978 1978 BSD 1.0 to 2.0 Unix 1979 Version 7 1979 Unix/32V 1980 1980 BSD 3.0 to 4.1 Xenix 1981 System III 1981 1.0 to 2.3 1982 1982 Xenix 3.0 1983 BSD 4.2 SunOS 1983 1 to 1.1 System V R1 to R2 1984 SCO Xenix 1984 Unix 1985 Version 8 SCO Xenix 1985 AIX V/286 System V 1986 Unix-like systems BSD 4.3 1.0 R3 HP-UX 1986 SunOS SCO Xenix 1.0 to 1.2 Unix 1.2 to 3.0 1987 V/386 1987 9 and 10 HP-UX 1988 (last versions BSD 4.3 System V 1988 2.0 to 3.0 from Tahoe R4 1989 Bell Labs) SCO Xenix 1989 BSD Net/1 V/386 BSD 4.3 1990 Reno 1990 1991 BSD Net/2 1991 Linux 0.0.1 SunOS 4 Minix 386BSD 1.x NexTSTEP/ 1992 OPENSTEP HP-UX 1992 1.0 to 4.0 NetBSD 6 to 11 0.8 to 1.0 Linux BSD 1993 SCO UNIX UnixWare 1993 0.95 to 1.2.x 4.4-Lite 3.2.4 1.x to 2.x & 1994 FreeBSD (System V 1994 1.0 to Lite Release 2 R4.2) 1995 2.2.x NetBSD 1995 OpenBSD OpenServer 1.1 to 1.2 Solaris 1.0 to 2.2 5.0 to 5.04 1996 2.1 to 9 1996 1997 1997 NetBSD 1.3 1998 FreeBSD 1998 3.0 to 3.2 OpenServer 1999 Minix 1999 Mac OS X 5.0.5 to 5.0.7 2.x Server 2000 2000 2001 to 2004 AIX 2001 to 2004 Linux 3.0-7.2 2005 2.x UnixWare 2005 7.x 2006 to 2007 (System V 2006 to 2007 R5) 2008 Solaris 2008 10 OpenServer Mac OS X, 2009 OpenBSD 6.x 2009 OS X, FreeBSD NetBSD 2.3-6.8 HP-UX 2010 macOS 3.3-12.x 1.3-8.1 2010 11i+ Minix 10.0 to 10.15 DragonFly 2011 3.1.0-3.4.0 (Darwin BSD 2011 1.2.1 to 19) 1.0 to 4.8 Linux OpenSolaris 2012 to 2015 2012 to 2015 3.x & derivatives (illumos, etc.) 2016 2016 Solaris Linux 11.0-11.4 2/26 2017 2017 4.x OpenServer 2018 10.x 2018 Linux 5.x 2019 2019 Unix Operating Systems Unix/Linux Surprising/New Features Multi-User multiple users work concurently (terminals); root user Multi-Tasking/Time-Sharing multiple tasks run concurently Hierarchical filesystem – tree structure with root "/" everything is a file (directory, device, . ) Software Management Tools and Repositories Linux distributions have software management tools and repositories with ability to install/update software automatically since mid 90s (1997 RPM, 1995 dselect) Android Store comes in . 2008 Windows Store comes in . 2012 How you search for a new software (or updates)? 3/26 Unix Operating Systems How To Start . for Windows Users connect to a remote machine (our case!) select a Linux Distribution and install it: allong your Windows Installation (dual-boot) in a virtual environment (e.g. VirtualBox) Windows Subsystem for Linux currently, there are more than 500 actively developed Linux Distributions2 2https://www.tecmint.com/linux-distro-for-power-users/ 4/26 Unix Operating Systems Linux Distributions Popular in Industry (EDA) Red Hat Enterprise Linux (RHEL) CentOS – RHEL "clone" SUSE Linux Enterprise (SLE) (Oracle Linux) 5/26 Unix Operating Systems Linux Distributions Popular for Home Use Fedora – driven by community around RedHat ("test enviroment" for RHEL) OpenSUSE – driven by community around SUSE Ubuntu – commercial but free (with a paid support option) Debian – greatest community driven distribution Many others: Linux Mint, Slackware, Gentoo, Arch, . 6/26 Command Line Interface – CLI Why to Use . How to Use . 1 Aims of this Lecture Shell Command Language – Unix 2 Unix Operating Systems Standard SSH – Secure Shell 3 Command Line Interface – CLI 4 (Our) BASH Reference It is Used for . 7/26 Command Line Interface – CLI It is Used for . traditional interface for interactive access to computers (super)computer terminals starting in the mid-1960s PCs in/since 1980s nowedays mostly (typical terminal host systems) servers and supercomputers – standardized embedded devices – standardized (e.g. AT) or custom/proprietary (e.g. KETCube) network equipment – routers, probes, . R&Ds personal computers – often mix TUI & GUI for efficiency & automation 7/26 Command Line Interface – CLI Why to Use . less resources remote access, terminal access . ! "embedded" scripting – automation & repetitive tasks CLI vs. script language: program execution vs. function call; work with text vs. work with data (objects) efficient work with files & text filter certain lines from a huge csv file (Excell will crash!) browse & search log files bulk file rename software execution control handle return value access "hidden" features ... 8/26 Command Line Interface – CLI How to Use . Terminal (emulator) HW device to access a terminal host system SW application (terminal emulator), that mimics HW terminal mostly on PC Command Interpreter: Exec CMD Prompt example – (ba)sh: [jan@host]:/home/jan$#[user@host]:path$ PROMPT Exec Batch Prompt example – KETCube: Assign variable >> 9/26 Command Line Interface – CLI Shell Command Language – Unix Standard shell is a command interpreter there are many Shell Command Language implementations with a superset of features sh (Bourne SHell), bash (Bourne Again SHell) – most popular ash (Almquist SHell), dash (Debian Almquist SHell) – leightweight, scripts (may be) compatible with bash csh (C shell), tcsh – increased readability (scripting!); C-inspired syntax sh is nowedays a link to (in most cases) bash, tcsh or dash We will discover only a small part of the Unix tool universe: Many details are hidden or simplified intentionally! 10/26 Command Line Interface – CLI SSH – Secure Shell the cryptographic network protocol – establishes a secured client-server connection/channel capabilities (openSSH, SSHv2): remote SHell & tunneling user authentication by password/private-public key pairs Secure Copy (SCP) and File Transfer (SFTP) protocols Software support: Un*x: openSSH client/server (ssh, sshfs, scp) Windows: Putty, WinSCP $ ssh [email protected] -i .ssh/id_rsa# access remote with $# pub/priv. key pair $ ssh -L8080:localhost:80 ws.net# access ws.net:80 $# from localhost:8080 $ ssh -X [email protected] xeyes# display xeyes locally 11/26 (Our) BASH Reference Filesystem Tree – Logic Filesystem 1 Aims of this Lecture Standard Unix Tools – Filesystem 2 Unix Operating Systems Standard Unix Tools – Text (Files) and Filters 3 Command Line Interface – Standard Unix Tools – CLI Control Flow Standard Unix Tools – 4 (Our) BASH Reference Get Help Command Execution Bash Tricks Builtin Commands Midnight Commander Shell Variables Tricks 12/26 (Our) BASH Reference Command Execution standard output (default is screen) standard input standard error output PROCESS (default is keyboard) (default is screen) ? CMD [parameters] > output < input inputs may be redirected from file: {< , «} outputs may be redirected to file: {> , »} commands may be concatenated: {; , &&, ||, ...} cmd1 ; cmd2 – run cmd1, then run cmd2 cmd1 | cmd2 – filter cmd1 && cmd2 – run cmd2 only if cmd1 OK cmd1 || cmd2 – run cmd2 only if cmd1 ERROR 12/26 (Our) BASH Reference Builtin Commands source – source file echo – print args to stdout pwd – get absloute path of the working directory exit – exit shell + return value 13/26 (Our) BASH Reference Builtin Commands $ source .bashrc $ $pwd / home / jan $ $ echo Hello World! Hello World! $ d bash: d: Command not found... $ alias d="date" $ d Po 2. listopadu 2020, 15:39:00 CET $ $ exit0# no error 14/26 (Our) BASH Reference Shell Variables Important variables: HOME – The current user’s home directory PATH – list of directories in which the shell looks for commands PS1 – prompt definition ? – last command status 15/26 (Our) BASH Reference Shell Variables $ echo $HOME / home / jan $ $ echo $PATH / usr /local/bin:/usr/local/sbin:/usr/bin:/usr/sbin $ $ PATH=${PATH}:/sbin# add new directory toPATH $ echo $PATH / usr /local/bin:/usr/local/sbin:/usr/bin:/usr/sbin:/sbin $ $ echo $PS1 [\u@\h \W]\$# special characters are evaluated byBASH $ 16/26 (Our) BASH Reference Filesystem Tree – Logic Filesystem relative path: ../.. absolute path: / / HDD0 etc home dev bin usr mnt ... HDD1 bin local nfs working directory relative path: .
Recommended publications
  • The Keys to Using SSH
    The Keys to Using SSH David Tomaschik RHCE, LPIC-1 System Administrator, Kennesaw State University MSCS Student, SPSU [email protected] http://systemoverlord.com Special ALE Central Edition! What is SSH? ● SSH = Secure Shell ● Originally intended as “Encrypted Telnet” ● Allows remote shell (command-line) access ● Connection Encrypted Using Public Key Cryptography ● SSH Version 1: Developed 1995, Now Insecure ● SSH Version 2: Standardized 2006 ● Only use SSH2! Why use SSH? ● Useful for remote system administration ● Transfer files securely ● Run remote applications ● Secure OTHER communications ● Requires Little Bandwidth ● Industry Standard SSH Clients ● Linux: OpenSSH; Usually Installed by Default ● OS X: OpenSSH; Installed by Default ● Windows: PuTTY, OpenSSH under Cygwin, Commercial SSH ● Android: ConnectBot + Others ● IOS: iSSH, Prompt, Others About the Presentation ● Assumes OpenSSH on Linux for both Client and Server ● Some features may require relatively recent versions of OpenSSH Basic Use ● ssh [email protected] Basic Use ● ssh [email protected] Verifying Who You're Connecting To ● The highlighted lines show you which host you are connecting to along with the key fingerprint. ● The key fingerprint is cryptographic proof that your connection is not being tampered with. ● Depending on your level of paranoia: ● Get the fingerprint from the system administrator ● Make your first connection from a 'trusted' network ● Just ignore it and hope its ok What You Can Do Now ● Run Commands Remotely ● Install packages/services ● Configure
    [Show full text]
  • The GNOME Desktop Environment
    The GNOME desktop environment Miguel de Icaza ([email protected]) Instituto de Ciencias Nucleares, UNAM Elliot Lee ([email protected]) Federico Mena ([email protected]) Instituto de Ciencias Nucleares, UNAM Tom Tromey ([email protected]) April 27, 1998 Abstract We present an overview of the free GNU Network Object Model Environment (GNOME). GNOME is a suite of X11 GUI applications that provides joy to users and hackers alike. It has been designed for extensibility and automation by using CORBA and scripting languages throughout the code. GNOME is licensed under the terms of the GNU GPL and the GNU LGPL and has been developed on the Internet by a loosely-coupled team of programmers. 1 Motivation Free operating systems1 are excellent at providing server-class services, and so are often the ideal choice for a server machine. However, the lack of a consistent user interface and of consumer-targeted applications has prevented free operating systems from reaching the vast majority of users — the desktop users. As such, the benefits of free software have only been enjoyed by the technically savvy computer user community. Most users are still locked into proprietary solutions for their desktop environments. By using GNOME, free operating systems will have a complete, user-friendly desktop which will provide users with powerful and easy-to-use graphical applications. Many people have suggested that the cause for the lack of free user-oriented appli- cations is that these do not provide enough excitement to hackers, as opposed to system- level programming. Since most of the GNOME code had to be written by hackers, we kept them happy: the magic recipe here is to design GNOME around an adrenaline response by trying to use exciting models and ideas in the applications.
    [Show full text]
  • Linux: Come E Perchх
    ÄÒÙÜ Ô ©2007 mcz 12 luglio 2008 ½º I 1. Indice II ½º Á ¾º ¿º ÈÖÞÓÒ ½ º È ÄÒÙÜ ¿ º ÔÔÖÓÓÒÑÒØÓ º ÖÒÞ ×ÓרÒÞÐ ÏÒÓÛ× ¾½ º ÄÒÙÜ ÕÙÐ ×ØÖÙÞÓÒ ¾ º ÄÒÙÜ ÀÖÛÖ ×ÙÔÔ ÓÖØØÓ ¾ º È Ð ÖÒÞ ØÖ ÖÓ ÓØ Ù×Ö ¿½ ½¼º ÄÒÙÜ × ÒרÐÐ ¿¿ ½½º ÓÑ × ÒרÐÐÒÓ ÔÖÓÖÑÑ ¿ ½¾º ÒÓÒ ØÖÓÚÓ ÒÐ ×ØÓ ÐÐ ×ØÖÙÞÓÒ ¿ ½¿º Ó׳ ÙÒÓ ¿ ½º ÓÑ × Ð ××ØÑ ½º ÓÑ Ð ½º Ð× Ñ ½º Ð Ñ ØÐ ¿ ½º ÐÓ ½º ÓÑ × ÒרÐÐ Ð ×ØÑÔÒØ ¾¼º ÓÑ ÐØØÖ¸ Ø×Ø ÐÖ III Indice ¾½º ÓÑ ÚÖ Ð ØÐÚ×ÓÒ ¿ 21.1. Televisioneanalogica . 63 21.2. Televisione digitale (terrestre o satellitare) . ....... 64 ¾¾º ÐÑØ ¾¿º Ä 23.1. Fotoritocco ............................. 67 23.2. Grafica3D.............................. 67 23.3. Disegnovettoriale-CAD . 69 23.4.Filtricoloreecalibrazionecolori . .. 69 ¾º ×ÖÚ Ð ½ 24.1.Vari.................................. 72 24.2. Navigazionedirectoriesefiles . 73 24.3. CopiaCD .............................. 74 24.4. Editaretesto............................. 74 24.5.RPM ................................. 75 ¾º ×ÑÔ Ô ´ËÐе 25.1.Montareundiscoounapenna . 77 25.2. Trovareunfilenelsistema . 79 25.3.Vedereilcontenutodiunfile . 79 25.4.Alias ................................. 80 ¾º × ÚÓÐ×× ÔÖÓÖÑÑÖ ½ ¾º ÖÓÛ×Ö¸ ÑÐ ººº ¿ ¾º ÖÛÐÐ Ð³ÒØÚÖÙ× Ð ÑØØÑÓ ¾º ÄÒÙÜ ½ ¿¼º ÓÑ ØÖÓÚÖ ÙØÓ ÖÖÑÒØ ¿ ¿½º Ð Ø×ØÙÐ Ô Ö Ð ×ØÓÔ ÄÒÙÜ ¿¾º ´ÃµÍÙÒØÙ¸ ÙÒ ×ØÖÙÞÓÒ ÑÓÐØÓ ÑØ ¿¿º ËÙÜ ÙÒ³ÓØØÑ רÖÙÞÓÒ ÄÒÙÜ ½¼½ ¿º Á Ó Ò ÄÒÙÜ ½¼ ¿º ÃÓÒÕÙÖÓÖ¸ ÕÙ×ØÓ ½¼ ¿º ÃÓÒÕÙÖÓÖ¸ Ñ ØÒØÓ Ô Ö ½½¿ 36.1.Unaprimaocchiata . .114 36.2.ImenudiKonqueror . .115 36.3.Configurazione . .116 IV Indice 36.4.Alcuniesempidiviste . 116 36.5.Iservizidimenu(ServiceMenu) . 119 ¿º ÃÓÒÕÙÖÓÖ Ø ½¾¿ ¿º à ÙÒ ÖÖÒØ ½¾ ¿º à ÙÒ ÐÙ×ÓÒ ½¿½ ¼º ÓÒÖÓÒØÓ ÒרÐÐÞÓÒ ÏÒÓÛ×È ÃÍÙÒØÙ º½¼ ½¿¿ 40.1.
    [Show full text]
  • Malware to Crimeware
    I have surveyed over a decade of advances in delivery of malware. Over this daVid dittRich period, attackers have shifted to using complex, multi-phase attacks based on malware to crimeware: subtle social engineering tactics, advanced how far have they cryptographic techniques to defeat takeover gone, and how do and analysis, and highly targeted attacks we catch up? that are intended to fly below the radar of current technical defenses. I will show how Dave Dittrich is an affiliate information malicious technology combined with social security researcher in the University of manipulation is used against us and con- Washington’s Applied Physics Laboratory. He focuses on advanced malware threats and clude that this understanding might even the ethical and legal framework for respond- ing to computer network attacks. help us design our own combination of [email protected] technical and social mechanisms to better protect us. And ye shall know the truth, and the truth shall make you free. The late 1990s saw the advent of distributed and John 8:32 coordinated computer network attack tools, which were primarily used for the electronic equivalent of fist fighting in the streets. It only took a few years for criminal activity—extortion, click fraud, denial of service for competitive advantage—to appear, followed by mass theft of personal and financial data through quieter, yet still widespread and auto- mated, keystroke logging. Despite what law-abid- ing citizens would desire, crime does pay, and pay well. Today, the financial gain from criminal enter- prise allows investment of large sums of money in developing tools and operational capabilities that are increasingly sophisticated and highly targeted.
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]
  • Alternative File Manager for Gnome
    C@ELOLJ<I Gnome Commander 8ck\ieXk`m\]`c\dXeX^\i]fi>efd\ ;@M@;<8E; :FEHL<I MXc\ipJ`Yi`bfm#=fkfc`X Twenty years ago, Peter Norton created a simple file manager with a cussed at regular intervals whether to implement a split-view feature for Nauti- split-view display. Can Gnome Commander inherit the veteran’s crown? lus – see the box titled “Split View” – but thus far, no definitive results have BY CHRISTIAN MEYER been forthcoming [2]. The first time Gnome Commander nome Commander integrates structure, this can really clutter up your launches, you will see a clear-cut win- seamlessly with the Gnome desktop with excess windows. Thus, a dow with a toolbar that includes naviga- >desktop, and in contrast to the split-view file manager, such as Gnome tion buttons for fast scrolling, to launch standard Gnome file manager, Nautilus, Commander [1], can be a blessing, espe- file operations (such as copying, mov- it offers a split-view mode – with two di- cially if you frequently copy and move ing, or deleting), and to edit and mail rectories in one window – that simplifies files and folders. copying and moving files. The ability to see Split View the source and target File managers typically display the contents of a single direc- Gf`ekjf]M`\n directories in the tory in each window. In split-view mode, a feature that Gnome One of the most strongly criticized fea- same window (for Commander and other programs offer, the program displays tures of Gnome is the “spatial view” ap- example, see Figure two folders in a single window (Figure 1).
    [Show full text]
  • Op E N So U R C E Yea R B O O K 2 0
    OPEN SOURCE YEARBOOK 2016 ..... ........ .... ... .. .... .. .. ... .. OPENSOURCE.COM Opensource.com publishes stories about creating, adopting, and sharing open source solutions. Visit Opensource.com to learn more about how the open source way is improving technologies, education, business, government, health, law, entertainment, humanitarian efforts, and more. Submit a story idea: https://opensource.com/story Email us: [email protected] Chat with us in Freenode IRC: #opensource.com . OPEN SOURCE YEARBOOK 2016 . OPENSOURCE.COM 3 ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ OPENSOURCE.COM...... ........ .. .. .. ... .... ........ WRITE FOR US ..... .. .. .. ... .... 7 big reasons to contribute to Opensource.com: Career benefits: “I probably would not have gotten my most recent job if it had not been for my articles on 1 Opensource.com.” Raise awareness: “The platform and publicity that is available through Opensource.com is extremely 2 valuable.” Grow your network: “I met a lot of interesting people after that, boosted my blog stats immediately, and 3 even got some business offers!” Contribute back to open source communities: “Writing for Opensource.com has allowed me to give 4 back to a community of users and developers from whom I have truly benefited for many years.” Receive free, professional editing services: “The team helps me, through feedback, on improving my 5 writing skills.” We’re loveable: “I love the Opensource.com team. I have known some of them for years and they are 6 good people.” 7 Writing for us is easy: “I couldn't have been more pleased with my writing experience.” Email us to learn more or to share your feedback about writing for us: https://opensource.com/story Visit our Participate page to more about joining in the Opensource.com community: https://opensource.com/participate Find our editorial team, moderators, authors, and readers on Freenode IRC at #opensource.com: https://opensource.com/irc .
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Lab Work 03. Using Ssh/Rdp for Remote Linux/UNIX/Mac/Windows Servers
    LAB WORK 03. USING SSH/RDP FOR REMOTE LINUX/UNIX/MAC/WINDOWS SERVERS MANAGEMENT 1. PURPOSE OF WORK Get the initial skills of working with a remote host via ssh protocol. Secure SHell is the primary means of remotely managing networked computers running UNIX/Linux. The Linux/UNIX commands are used: ssh, scp, uname, passwd, date, who, pwd, mkdir, mc, exit, logout. 2. TASKS FOR WORK 2.1. Install Secure Shell Extension on your Chrome browser in the classroom or at home. Using the Secure Shell Extension, connect to the academy.lv remote server with your student account. Use the uname command (with the appropriate parameters) to determine the type of operating system, hardware platform, and version of the server core (make a Screenshot 1). 2.2. Download Putty.exe on your Windows computer in the classroom or at home. Using the putty.exe, connect to the academy.lv remote server with your student account. Use the passwd command for change Your password on academy.lv remote server. Use the date command (with the appropriate parameters) to determine the date and time of the remote server (make a Screenshot 2). 2.3. Start Your Linux Virtual Machine on VirtualBox on your Windows computer (show Lab Work 01). Start Linux Terminal. 2.4. Use the uname command (with the appropriate parameters) to determine the type of operating system, hardware platform, and version of the server core for local Linux (make a Screenshot 3). 2.5. Use the ssh command on Linux Virtual Machine (without loading the academy.lv remote server shell) to determine the date and time (date command with the appropriate parameters) for academy.lv remote server (make a Screenshot 4).
    [Show full text]
  • LINUX UNTERWEGS Laptop Im Gepäck: Reise Und Arbeit LINUX UNTERWEGS LINUX Als Digitaler Nomade Kombinieren S
    Lin-Habu: Professionelle COMMUNITY-EDITIONEskil: Grafisches Diff für S. 54 Buchhaltung im Test S. 64 Dateien und Verzeichnisse Frei kopieren und beliebig weiter verteilen ! 05.2017 05.2017 Routen planen und dokumentieren, Reisedaten auswerten, IT-Tipps für Globetrotter LINUX UNTERWEGS LINUX UNTERWEGS Laptop im Gepäck: Reise und Arbeit LINUX UNTERWEGS LINUX als digitaler Nomade kombinieren S. 16 Routino: Strecken offline planen mit OSM-Daten S. 30 QMapShack: GPS-Tracks komfortabel aufbereiten S. 24 Fahrtenbuch: Grafische Reiseauswertung mit Python S. 34 Drucktexte automatisiert digitalisieren S. 84 Perfektes Duo zur Texterkennung: Tipparbeit sparen mit der freien OCR- Engine Tesseract und dem darauf abgestimmten grafischen Frontend GImageReader Audiodaten editieren S. 58 Winzling KolibriOS S. 72 Bequemer als Audacity, simpler als KWave: Klein, aber oho: Unixoider grafischer Schnell ans Ziel mit dem Soundeditor Eko Desktop mit minimalem Footprint Top-Distris • Eko • Eskil • Kodachi • KolibriOS • Lin-Habu • Pi Zero W • Texterkennung • Unbound • VeraPDF • VeraPDF • Unbound Texterkennung W • • Eko Eskil Kodachi KolibriOS Lin-Habu Pi Zero auf zwei Heft-DVDs ESKIL • KOLIBRIOS • LIN-HABU • PI ZERO W • UNBOUND • VERAPDF • • VERAPDF • UNBOUND • W PI ZERO • LIN-HABU • KOLIBRIOS • ESKIL EUR 8,50 EUR 9,35 sfr 17,00 EUR 10,85 EUR 11,05 EUR 11,05 2 DVD-10 05 www.linux-user.de Deutschland Österreich Schweiz Benelux Spanien Italien 4 196067 008502 05 Editorial Dreckschleudern Sehr geehrte Leserinnen und Leser, zu den Modesünden meiner Jugend ge­ lich des jeweiligen Sachgebietes“. Ad­ hörten Cowboystiefel und Bomber­ blocker dagegen seien schuld am Nieder­ jacken. Derart ausstaffiert, bewies man gang der Qualitätsmedien, und wer keine in den späten 1970ern Lässigkeit, Ele­ Online­Werbung ansehe, der informiere ganz und Männlichkeit – glaubten wir sich dann „durch Blogger ohne journalis­ damals zumindest.
    [Show full text]
  • GNOME 1.2 Desktop COMEBACK of THE
    GNOME SOFTWARE GNOME 1.2 Desktop COMEBACK OF THE Ignored by many GNOME users and prematurely ANDREAS HUCHLER written-off by some distributions the GNOME desktop environment fights back with a new version. Here, we take a look at the most important components of Helix GNOME 1.2 to help you decide if an upgrade or new installation is worthwhile. About four years ago a group of Linux enthusiasts elements to be produced in a similar easy manner. on the Internet got together with the aim of devel- The differences were not resolved, so in the end oping a graphical user interface for Linux that would some of the developers decided to support the Qt- Helixcode stand comparison with Windows and Mac OS. based KDE project whilst the others started to cre- The American firm Helixcode, It’s true that at that time there were already sev- ate the gtk-based GNOME project. Inc. (http://www.helixcode.com) eral window managers – for example, fvwm2 and cofounded by GNOME evange- Afterstep – for the X interface; with CDE a desktop Co-operation list and author of Midnight environment was even available. However, these Commander Miguel de Icaza, solutions all had disadvantages – the window man- Over time, not least because of the subsequent has made it its goal to help agers had so session management nor support for open source licensing of Qt, the former rivalry GNOME break through as an drag and drop; CDE was commercial and obsolete – between the two projects gave way to a spirit of co- Internet desktop. In addition so there was a real need for a new graphical inter- operation.
    [Show full text]
  • Mac OS X Server Introduction to Command-Line Administration Version 10.6 Snow Leopard Kkapple Inc
    Mac OS X Server Introduction to Command-Line Administration Version 10.6 Snow Leopard K Apple Inc. Apple Remote Desktop, Finder, and Snow Leopard are © 2009 Apple Inc. All rights reserved. trademarks of Apple Inc. Under the copyright laws, this manual may not AIX is a trademark of IBM Corp., registered in the U.S. be copied, in whole or in part, without the written and other countries, and is being used under license. consent of Apple. The Bluetooth® word mark and logos are registered The Apple logo is a trademark of Apple Inc., registered trademarks owned by Bluetooth SIG, Inc. and any use in the U.S. and other countries. Use of the “keyboard” of such marks by Apple is under license. Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may This product includes software developed by the constitute trademark infringement and unfair University of California, Berkeley, FreeBSD, Inc., competition in violation of federal and state laws. The NetBSD Foundation, Inc., and their respective contributors. Every effort has been made to ensure that the information in this manual is accurate. Apple is not Java™ and all Java-based trademarks and logos responsible for printing or clerical errors. are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Apple 1 Infinite Loop PowerPC™ and the PowerPC logo™ are trademarks Cupertino, CA 95014 of International Business Machines Corporation, used 408-996-1010 under license therefrom. www.apple.com UNIX® is a registered trademark of The Open Group. Apple, the Apple logo, AppleScript, FireWire, Keychain, Other company and product names mentioned herein Leopard, Mac, Mac OS, Quartz, Safari, Xcode, Xgrid, and are trademarks of their respective companies.
    [Show full text]