© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

Linux Users and Groups Management
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 2 Manage User Access and Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Linux+ Guide to Linux Certification, Second Edition
Linux Operations and Administration
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Session 5: Working with MySQL iNET Academy Open Source Web Development.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Linux+ Guide to Linux Certification, Third Edition
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
SUSE Linux Enterprise Desktop Administration Chapter 6 Manage Software.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Chapter 10: Rights, User, and Group Administration.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
1 Begin to use Linux. 2 Background  Linux is an operating system similar to UNIX. It runs on many different computers and was first released in 1991.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
SCSC 455 Computer Security Chapter 3 User Security.
Lecture – Users and groups
Linux Operations and Administration
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Experiment No 4 Prepared by, Mr. Satish Pise. Objectives View the /etc/passwd file and describe its syntax. View the /etc/shadow file and describe its.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
2Operating Systems  Program that runs on a computer  Manages hardware resources  Allows for execution of programs  Acts as an intermediary between.
Guide to Operating Systems, 5th Edition
Lab 05 Firewalls.
System Programming and administration CS 308
Chapter 11: Managing Users
Active Directory Administration
9 Linux on the Desktop.
Ubuntu Working in Terminal
Chapter 2 User Management
Linux Users and Groups Management
IS3440 Linux Security Unit 3 User Account Management
Systems Administration CSCI Fall 2016
Adding New Users, Storage, File System
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
COP 4343 Unix System Administration
Figure 6-9: Managing Users and Groups
System & Network Administration (MCSA & RHCSA)
Module 13 System and User Security
Administering Users and Groups
Administering Users and Groups
Adding New Users.
Presentation transcript:

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 2 yum Yellow Dog Updater, Modified Ready to use as installed Works with rpm packages Download from repositories

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 3 yum update yum install whatever

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 4 pirut graphical interface to add or remove software

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 5

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 6 BitTorrent P2P – peer to peer Does not use a dedicated server tracker – server that allows client to communicate with one anther peer – client that has downloaded part of the BitTorrent file seed – has whole file and acts as an addition source for the BitTorrent file collectively called a swarm

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 7 In this animation, the colored bars beneath all of the 7 clients in the upper region above represent individual pieces of the file. After the initial pieces transfer from the seed (large system at the bottom), the pieces are individually transferred from client to client. The original seeder only needs to send out one copy of the file for all the clients to receive a copy.

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 8 RPM installs uninstalls upgrades queries and verifies rpm packages used by many different distributions keeps track of installed packages, version,where software packages are installed and the dependencies between the packages

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 9 software rpm # rpm -i software rpm  to install # rpm -U software rpm  to upgrade

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 10 Chapter 16 Administration Tasks

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 11 Figure 16-1 The User Manager window, Users tab

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 12 Figure 16-2 The User Properties window, User Data tab

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 13 Managing Users and Groups One of the key administrative tasks with Linux is managing users and groups. The primary reason for user accounts is to verify the identity of each individual using a computer system.  A secondary reason for user accounts is to permit the per-individual tailoring of resources and access privileges. Resources can include files, directories, and devices. Controlling access to these resources is a primary task of an administrator

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 14 Groups tie together users that have a common purpose.  an organization may have persons responsible for accounts payable and others responsible for payroll. By placing the user accounts in an accounts payable group then common permissions can be given to all the members of that group. Members of the accounts payable group would not have access to the information and resources of the payroll group. Users within the same group have the same read, write. or execute privileges of group resources.

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 15 etc Several files are used when creating users in Linux. The following are a few most commonly used. /etc/passwd /etc/shadow /etc/group

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 16 /etc/passwd The /etc/passwd file contains the user ID, and default home directory. Because this file is used by many tools it needs to be readable by any user. To view the /etc/passwd file use the less command. less /etc/passwd  The /etc/passwd file is a group of fields separated with a colon (:). They are username, password (shown as an x), numeric user ID, numeric group ID, full name, user’s home directory, and user’s shell account.

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 17 /etc/shadow The /etc/shadow file contains the encrypted passwords and other password information.  This file is viewable by the root user only. To view the /etc/shadow file use the following commands: su – root tail /etc/shadow The /etc/shadow file is a group of fields separated with a colon (:). They are:  Username  password (13 characters encrypted)  the number of days since the password was last changed  the number of days before the password may be changed  the number of days to warn a user of an expiring password  the number of days after a password expires that account is disabled  the number of days since an account has bee disabled  a reserved field for possible future use.

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 18 Adding a User 1 Use the useradd command to add a user. The syntax of the command is displayed by typing the command alone. useradd The most basic command to add a user named John Smith with and user ID of jsmith is the following: useradd jsmith If you view /etc/passwd after the add you will see that jsmith has been added. jsmith:x:501:501::/home/jsmith:/bin/bash id:password(shadowed):Full Name:homeDir:shell  The full name can be added with the –c option. useradd –c “John Smith” jsmith

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 19 Adding a User 2 When a user is added the home directory is not created automatically. It is assigned but not created until the user logs in the first time. To force the home directory to be created use the –m option. The following command will create the jsmith user and create the associated home directory: useradd –c “John Smith” –m jsmith View the jsmith user home directory with the command: ls /home/directory Any files and directories that are in the /etc/skel directory are automatically copied into the newly created home directory. If /etc/skel has no files or directories (the default) then nothing is created. The /etc/skel directory on this Linux system has a Documents directory and a Welcome file.

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 20 Adding a User 3 A look at the /etc/shadow file shows that jsmith was added but a password has not been assigned. The command to add a password is passwd. As root you can change the password for jsmith with the following command: passwd jsmith You will be asked to type the password and then repeat it to ensure it was typed correctly. The root user can change any user password. A user can change their own password by typing passwd without a user ID. passwd has options to configure the minimum password lifetime, maximum password lifetime, and other options.

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 21 Deleting a User Deleting a user is done as the root user with the userdel command. To delete the user jsmith use the command: userdel jsmith Userdel has one option, -r, which removes the user’s home directory as well as the account. To remove jsmith and the associated home directory, /home/jsmith, use the following command: userdel –r jsmith Once a user’s home directory is removed it would have to be restored from backup to recover it. There may be orphaned files – files that are not associated by a valid user – when you delete a user  Example: jsmith was storing some files in /tmp. Those files are not deleted when the user jsmith is removed. Those files in /tmp are now orphaned.

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 22 Adding a Group The mail file for groups is the /etc/group file. The file is a group of fileds that describe the group and who is a member of it. The fields in order are the group name, password (not used), numeric ID, and then a list of members separated by a comma. A group is used to assign rights and permissions to users. For example, if you have several files that should be made available to users in the Accounts Payable department you could create an Accounts Payable group then add users to the group. Once the group is populated then the permissions of the file or directory can be changed to allow access by the group. To add a group use the groupadd command. groupadd AccountsPayable

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 23 Assigning Users to a Group The usermod command is used to add users to a group.  It also has options to change the home directory, change the shell, and other values. To use usermod to add users jsmith and jdoe to the AccountsPayable group type the following: usermod –G AccountsPayable jsmith usermod –G AccountsPayable jdoe

© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 24 Changing Group Permissions Groups can be used to assign privileges to resources, such as a directory.  to change the group to AccountsPayable. This is accomplished with the following command: chgrp –R AccountsPayable AP  Where –R causes it to recursively affect files and directories within the AP directory, AccountsPayable is the new group, and AP is the name of the directory.  Permissions for group are then changed to give full read/write/execute access with the chmod command. chmod 775 AP