Reference no: EM133140256
KIT501 ICT Systems Administration Fundamentals - University of Tasmania
Practical
Goal
The main purpose of this first UNIX tutorial is to ensure that you have a basic familiarity with the UNIX system and some general-purpose UNIX commands.
1. Introducing UNIX Operating System
UNIX Overview
An Operating System (OS) is a set of computer software routines that sits between application programs and hardware devices. An OS provides common services (such as Save, Save As, Print) to applications, which allow applications to access hardware devices. An OS offers a graphical user interface (GUI) and/or command-line user interface (CUI) to computer users, which allow users to run applications (or system programs) for various tasks.
UNIX arrived earlier than Microsoft Windows and Mac OS, and has been a platform for serious work:
• The Internet with the TCP/IP communication protocol suite were first ported to UNIX.
• Unix/Linux has been the dominating Server Operating System for worldwide server computers.
• Enterprise-scale databases as well as general e-commerce have been deployed on UNIX
• Written in C (a high-level programming language) so can run on nearly all hardware platform.
UNIX System Administration
• Allocate/close user accounts
• Maintain file system
• Manage disk space
• Maintain security
• Take backups
• (others - handle hardware devices, reinstall OS, etc)
A UNIX system administrator uses or develops shell scripts for automating regular operations. Shell programming or shell scripting will be introduced later in this course.
UNIX User Accounts
UNIX is security-conscious and can be used only by people who maintain an account with the system. The system administrator has a special user account, called root. The root user (also called super- user) has near-absolute power. Some programs can only be run from this account, eg, the program that creates user accounts.
The administrator opens a user account by providing a meaningful string (username) and an un- meaningful string (password). Users are expected to change their passwords immediately after first login. After this, you are the only person who knows your plain-text password, because UNIX only records encrypted passwords in a file (the UNIX shadow file, /etc/shadow) which can only be read by the system administrator.
The following instructions assume you are using an ICT lab desktop machine. Your personal machine will differ depending on which ssh client you have installed.
On Microsoft Windows:
1. Find the application named Secure Shell Client.
2. On the Secure Shell Client, click on Quick Connect, enter the UNIX host/server name (ictteach.its.utas.edu.au), your username, and choose Password as the authentication method. Click on Connect.
3. If the application asks you to save the new host key to the local database, click on Yes.
4. Enter your UTAS password (if your UTAS password is the same as your ICT password) and then click on OK.
5. Now that you are on your UNIX host, you can start to practice UNIX commands. Before this, you can use the small popup window to add a profile: enter the UNIX host name (ictteach) and click on Add to Profiles. Next time you want to set up a connection to the same host you can simply click on Profiles, then on the host name, enter your ICT password, and then you are on your UNIX host. If by the time you finish reading this paragraph the small popup window has disappeared, you can click on "Profiles" then click on "Add Profile" to do this.
6. If the text in front of you appears too small, you can make it larger by clicking on Edit, then on Settings, Global Settings, Appearance, Font to set a larger font size.
Attachment:- UNIX Operating System.rar