...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...
Words: 2032 - Pages: 9
...NETW240 Final Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The Final Exam is open book, open notes. The maximum time you can spend in the exam is 3 hours, 30 minutes. If you have not clicked the Submit For Grading button by then, you will be exited from the exam automatically. In the Final Exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet service providers and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Final Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to log in again as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders * You will only be able to enter your online Final Exam one time. * Click the Save Answers button often. * If you lose your Internet connection during your Final Exam, log on again and try to access your Final Exam. If you are unable to enter the Final Exam, first contact the Help Desk and then your instructor. * You will always be able to see...
Words: 1361 - Pages: 6
...the basic understanding of this new technology. The area people need to start when trying to understand the basics of any computer hardware system would the operating system. Operating systems are a program which manages the computer’s hardware. These systems provide a basis for application programs and intermediate between the computer’s user and its hardware. There are many different types of Operating serves that are available to use. There are four main Operating systems that are used in today’s Technological world: UNIX, Linux, Mac, and Windows. Each one of these systems has its own unique aspects to offer users, while still sharing the same basics that an operating system needs. Memory Management UNIX/Linux In comparison to other operating systems, UNIX is quite different when it comes to managing its memory. It uses extremely sophisticated memory management algorithms to make the best use of memory resources. Though UNIX and Linux are extremely similar when it comes to how things work internally, there are slight differences that make UNIX distinct. One process that UNIX uses is Swapping; this is done by moving chunks of the Virtual Memory, known as pages, out of the main memory and moving others in. In order for this process to work at its best, those pages that are needed must be accessible in the Main Memory at the demand of the CPU. When a page is expected to be needed in the very near future it is called a resident set. This can lead to errors due...
Words: 4984 - Pages: 20
...edhat® ® Te r r y C o l l i n g s & K u r t W a l l UR ON IT OOLS IN Y T C E CD-R L TH O ED UD M Linux Solutions from the Experts at Red Hat ® ® P R E S S™ SEC Red Hat® Linux® Networking and System Administration Red Hat® Linux® Networking and System Administration Terry Collings and Kurt Wall M&T Books An imprint of Hungry Minds, Inc. Best-Selling Books G Digital Downloads G e-Books G Answer Networks e-Newsletters G Branded Web Sites G e-Learning New York, NY G Cleveland, OH G Indianapolis, IN Red Hat® Linux® Networking and System Administration Published by Hungry Minds, Inc. 909 Third Avenue New York, NY 10022 www.hungryminds.com Copyright © 2002 Hungry Minds, Inc. All rights reserved. No part of this book, including interior design, cover design, and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or otherwise) without the prior written permission of the publisher. Library of Congress Control Number: 2001093591 ISBN: 0-7645-3632-X Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RT/QT/QS/IN Distributed in the United States by Hungry Minds, Inc. Distributed by CDG Books Canada Inc. for Canada; by Transworld Publishers Limited in the United Kingdom; by IDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty. Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand...
Words: 220815 - Pages: 884
...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap...
Words: 2750 - Pages: 11
...WHITE PAPER MICROSOFT WINDOWS SERVER VS. RED HAT ENTERPRISE LINUX Costs of Acquisition and Support – A Comparison August 2005 PREPARED FOR Microsoft TABLE OF CONTENTS Main Findings.................................................... 1 Executive Summary ......................................... 2 Analysis ............................................................. 2 License and Subscription Considerations Support Considerations The Total Solution Viewpoint 2 3 6 Main Findings 1. Microsoft’s Windows Server 2003 enterprise license and support costs are competitive with Red Hat Enterprise Linux. 2. The two companies’ different approaches to enterprise licensing and support, and the fact that investments of this magnitude tend to involve longer-term commitments, means that the best pricing comparisons should be based on a period of ownership (three to six years), rather than on just initial acquisition charges. 3. Support is integral to both companies’ solutions and Microsoft’s separate support and license fee structures, in contrast with Red Hat's combined subscription and support offerings, can give a Microsoft solution a significant pricing advantage over a Red Hat solution. In Review ........................................................... 7 Major Findings Other Findings 7 7 Appendix –Modeling Assumptions................. 8 General Operating System Licensing and Subscription Pricing Support Server Hardware 8 8 9 9 10 Chart 1 compares the cumulative...
Words: 4833 - Pages: 20
...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................
Words: 17681 - Pages: 71
...Linux versus Windows The purpose of this document is to explore the benefits or disadvantages of using UNIX® or Linux® versus Windows Server® for company business operations at Kudler Fine Foods. Background Three grocery stores in southern California comprise Kudler Fine Foods. Employing approximately 150 people, Kudler caters to people who enjoy gourmet-class foods, first-rate service, and a friendly atmosphere helps make a pleasant shopping experience. Current company information technology (IT) assets include local 10BaseT Ethernet networks at the three locations, Windows Server at the La Jolla headquarters, and 56kb modem links between the facilities enabling sharing of company information. At each store a point of service (POS) cash register application links the 20 total terminals to a proprietary purchasing application for inventory price lookup and monetary exchanges. The company also uses the Windows Server platform to run an e-commerce website for sales of select inventory over the Internet. Security The Kudler Fine Foods e-commerce stores security of the server is the number one priority of team B. Which server is the most secure, Linux or Windows? Many information technicians have their favorite but the bottom line is, which operating system has the target on their back as far a security breaches. According to Noyes (2010) there are five key factors that make Linux superior to Windows. • Privileges • Social Engineering • The Monoculture Effect •...
Words: 2469 - Pages: 10
...MySQL Cluster Quick Start Guide – LINUX This guide is intended to help the reader get a simple MySQL Cluster database up and running on a single LINUX server. Note that for a live deployment multiple hosts should be used to provide redundancy but a single host can be used to gain familiarity with MySQL Cluster; please refer to the final section for links to material that will help turn this into a production system. 1 Get the software For Generally Available (GA), supported versions of the software, download from http://www.mysql.com/downloads/cluster/ Make sure that you select the correct platform – in this case, “Linux – Generic” and then the correct architecture (for LINUX this means x86 32 or 64 bit). If you want to try out a pre-GA version then check http://dev.mysql.com/downloads/cluster/ Note: Only use MySQL Server executables (mysqlds) that come with the MySQL Cluster installation. 2 Install Locate the tar ball that you’ve downloaded, extract it and then create a link to it: [user1@ws2 ~]$ tar xvf Downloads/mysql-cluster-gpl-7.1.3-linux-x86_64-glibc23.tar.gz [user1@ws2 ~]$ ln -s mysql-cluster-gpl-7.1.3-linux-x86_64-glibc23 mysqlc Optionally, you could add ~/mysqlc/bin to your path to avoid needing the full path when running the processes. 3 Configure For a first Cluster, start with a single MySQL Server (mysqld), a pair of Data Nodes (ndbd) and a single management node (ndb_mgmd) – all running on the same server. Create folders to store the configuration...
Words: 848 - Pages: 4
...After researching some popular commercial windows applications, I have found a few good open-source alternatives for Linux users. The four Windows applications I researched were Adobe Acrobat, Adobe Photoshop, Internet Explorer, and Norton Anti-Virus. The most user friendly Adobe Acrobat alternative I found was PDFMod. This a very user friendly platform with a nice GUI interface that allows you to reorder, rotate, and remove pages, export images from a document, edit the title, subject, author, and keywords, and combine documents via drag and drop. This program is very simple and easy to use to modify PDF documents. Adobe Photoshop was a little harder to find a good alternative, but I think that GIMP 2.6 answers that call. GIMP is a very simple yet complex application that can be used as a simple paint program, an expert quality photo retouching program, an online batch processing system, a mass production image renderer, an image format converter, etc. You can expand GIMP with the use of plug-ins and extensions to do just about anything. Gimp also has an advanced scripting interface allows everything from the simplest task to the most complex image manipulation procedures to be easily scripted. An obvious choice for me as a replacement for Internet Explorer(due to the fact that I already use it) is Mozilla Firefox. Firefox is, in my opinion, a superior browser with better security, performance, personalization, etc. With Firefox you can sync your desktop browser with your...
Words: 446 - Pages: 2
...……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...
Words: 17866 - Pages: 72
...enterprise LinuX subscription Guide subscription Guide Table of ConTenTs Introduction How IT organizations benefit from subscriptions What is included in your Red Hat subscription? Support for the production environment Subscription packaging model Assembling your subscription order Sample worksheet 1: Provisioning physical servers Sample worksheet 2: Adding guests to a virtual environment Sample worksheet 3: Setting up a virtual environment Subscription scenarios and recommendations Physical production environment Sample worksheet 4: Setting up a physical, mission-critical production environment Virtual production environment Sample worksheet 5: Calculating subscriptions for guests Sample worksheet 6: Calculating subscriptions for Red Hat Enterprise Linux on virtual environments Open hybrid cloud Sample worksheet 7: Calculating subscriptions for a private cloud Public cloud access subscriptions Sample worksheet 8: Calculating subscriptions for a public cloud Disaster recovery Development environment Desktops and workstations Managing subscriptions Renewing subscriptions Subscription terms facebook.com/redhatinc @redhatnews linkedin.com/company/red-hat 2 3 3 5 6 8 9 9 9 10 10 11 11 12 13 13 14 14 14 14 15 15 16 17 17 redhat.com System coverage Support services levels Proper use of subscriptions and services Next steps Registering on the Red Hat Customer Portal Activating subscriptions Downloading software Entitling subscriptions Red Hat Enterprise Linux products ...
Words: 8641 - Pages: 35
...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active...
Words: 2760 - Pages: 12
...NT1430 Final Review 1. Know what a swap partition is used for. a. The swap partition is an independent section of the hard disk used solely for swapping; no other files can reside there. Swap partition is used to turn the hard drive into extra RAM. 2. Know what an architecture is, and which are supported by Fedora. a. 32 and 64 bit b. Fedora CDs and DVDs hold programs compiled to run on a specific processor architecture (class of processors, or CPUs) c. There are several that Fedora supports: i. EM64T/AMD64 ii. A 64 bit distribution allows each process to address more than 4 gigabytes of RAM. iii. I383/i686 (Intel x86) iv. X86_64 (AMD64 and Intel EM64T) v. Mac PowerPC (PPC) 3. Know how the root of the file system is represented. a. The root is represented by a / b. Fedora uses the Filesystem Hierarchy Standard (FHS) file system structure, which defines the names, locations, and permissions for many file types and directories. c. The two most important elements of FHS compliance are: i. Compatibility with other FHS-compliant systems ii. The ability to mount a /usr/ partition as read-only. This is especially crucial, since /usr/ contains common executables and should not be changed by users. In addition, since /usr/ is mounted as read-only, it should be mountable from the CD-ROM drive or from another machine via a read-only NFS mount. 4. Know what the cp command is used for. a. The Linux cp command is usually used to copy files and copy directory in Linux...
Words: 1334 - Pages: 6
...Date: 06/27/2012 A LONG-TERM STRATEGY FOR DATA PROTECTION AND DISASTER RECOVERY FOR THE BR-DB01 MySQL DATABASE SERVER by Francis Nicholas Introduction This document discusses the recommended option for a long-term strategy for data protection and disaster recovery for the Sentrana MySQL and Infobright databases. After extensive research, the following components will provide for a long-term strategy for data protection and disaster recovery for the MySQL database server: 1. MySQL Master-Slave database server replication[1]. 2. Full daily and a full weekly backup of all databases on the master and slave servers respectively. a. Differential/incremental backups plan is currently under investigation. This is because a lot of articles I came across during my research advised against it due to the nature of its complexity and the level of difficulty in it implementation. 3. A clean up plan[3] that includes the removal of any database backups older than 7 days on the master server and 7 weeks on the slave server respectively. MySQL Master-Slave Database Server Replication The MySQL Master-Slave database server replication enables one database server, called the master, to be replicated to one or more MySQL servers, called slaves[4]. In our case, the master server will start off as the BR-DB01 database server. The server currently acting as Appserver-05 in the MarketMover environment is upgradeable to meet the present system and storage requirements needed...
Words: 1031 - Pages: 5