List the files in the current directory

Assignment Help Operating System
Reference no: EM132187680

Question: Working on the Command Line

These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following and write down the commands.

Lab 2.1 Manage Files

STEP 1. Open a terminal window.

STEP 2. Display your current directory.

STEP 3. Using an absolute pathname, switch to the /etc directory.

STEP 4. Using a relative pathname, move to the /etc/skel directory.

STEP 5. Using a relative pathname, move up one directory.

STEP 6. List the files in the current directory.

STEP 7. Perform a "long display" listing of the files in the current directory.

STEP 8. List all the files in the current directory that begin with the letter s.

STEP 9. Run the command that will determine the type of contents in the /etc/group file.

STEP 10. Display only the last five lines of the /etc/group file.

STEP 11. Execute the command to return to your home directory.

STEP 12. Make a directory named data in the current directory.

STEP 13. Copy the /etc/passwd file into the data directory.

STEP 14. Copy the /etc/ppp directory into the current directory (and ignore any "Permission denied" error messages).

STEP 15. Rename the ppp directory that is located in the current directory to peers.

STEP 16. Update the timestamp of the data/passwd file to the current date and time.

STEP 17. Create a new empty file named test in the data directory.

STEP 18. Delete the data/passwd file.

STEP 19. Delete the peers directory.

Lab 2 Using Shell Features

STEP 1. Open a terminal window.

STEP 2. Display the value of the HOME variable.

STEP 3. Display all the shell variables and values.

STEP 4. Display the value of the TEST variable. (Note that this variable currently has no value.)

STEP 5. Change the current shell so that an error message will be displayed when an undefined variable is used.

STEP 6. Modify the PATH variable to include the /opt directory.

STEP 7. Create a new environment variable named EVENT and set it to the value "now" by using a single command.

STEP 8. Display all the environment variables.

STEP 9. Create an alias in the current shell for the ls command so it will run the command ls -a.

STEP 10. Display all the aliases for the current shell.

STEP 11. Remove the fgrep alias from the current shell.

STEP 12. Display a list of previously executed commands.

STEP 13. Re-execute the last ls command from the history list.

STEP 14. Change the maximum number of commands stored in the history list for the current shell to a value of 2000.

STEP 15. Execute the ps -fe command and pipe the output to the less command.

STEP 16. List all filenames in the /etc directory structure (including subdirectories) that are group owned by the lp group.

STEP 17. Display all the files in the /etc/passwd file that contain at least three sequential numbers.

STEP 18. Display the /etc/passwd file with all occurrences of root replaced with XXXX.

Lab 2 Compressing Files

STEP 1. Open a terminal window.

STEP 2. While using the verbose feature, create a tar file named ppp.tar that contains the contents of the /etc/ppp directory. (Ignore any error messages.)

STEP 3. List the contents of the ppp.tar file.

STEP 4. Create a directory named tar_data in the current directory.

STEP 5. Extract the contents of the ppp.tar file into the tar_data directory.

STEP 6. Compress the ppp.tar file by using the gzip command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.gz.

STEP 7. Compress the ppp.tar file with the bzip2 command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.bz2.

STEP 8. Compare the size of the ppp.tar.gz and ppp.tar.bz2 files to determine which one is smaller.

STEP 9. Delete the ppp.tar file.

STEP 10. Unzip the ppp.tar.gz file.

Reference no: EM132187680

Questions Cloud

Develop a request for proposal plan : Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery.
What is the weighted average cost of capital : What is the weighted average cost of capital and What is the salvage cash flow of the new equipment? Include the income tax effect
Develop a chain of custody form to be used within a business : In your investigative journal, develop a chain of custody form to be used within a business based on forensic notes for the final project.
Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.
Overview of key issues addressed in the section : Analysis and Critical Thinking Thoughtful analysis is performed to help situate the evidence within the team argument and provide engagement with the topic
What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Reviews

Write a Review

Operating System Questions & Answers

  Draw curves for throughput-delay and power

Assume two hosts A and B are connected via router R. A-R link has infinite bandwidth; A-R link has infinite bandwidth; draw curves for throughput, delay, and power, each as function of load.

  Write about way ios is better than android

Write about way IOS is better than android. Discuss the things that you know about it and why you find it so interesting.

  What is turning out to be the wireless standard

Are there any one standard coming about in the wireless industry which seems to be taking the lead over the others.

  Implement the parser in two iterations

Implement the parser in a separate file. Implement the main parser function in a separate file main.c

  Provide a diagram illustrating the linux kernel architecture

You will provide a diagram illustrating the Linux kernel architecture and various components and classify it according to what we discussed in class.

  Security and data protection systems

Determine what fault tolerance, security, and information protection systems and procedures do you recommend be instituted on and for the corporation's network from the hypothetical condition below?

  What is the office automation and group collaboration s/w

What is the office automation and group collaboration software which is used in any oraginization

  describe how you would do so with a positive feedback loop.

Describe how you would use a negative feedback loop to manage your bank balance.Describe how you would do so with a positive feedback loop. Explain which you would prefer and why?

  Differences between the internet, intranets, extranets

Discuss similarities and differences between the Internet, intranets, extranets. Define e-Commerce and discussow can e-Commerce businesses be categorized?

  Implement the first come first serve scheduling algorithm

COSC 3406 (Programming: Java or C++) Assignment. Implement the following scheduling algorithms and report the average waiting time for all these cases. First Come First Serve and Shortest Job First and Priority Scheduling (preemptive and lower the nu..

  Compare cron, anacron, and systemd timer units

An important service provided by any system is the ability to run a process on a predetermined schedule without human intervention. The “automation” of tasks can reduce the workload of the system administrator significantly. Unfortunately Linux curre..

  Single table manipulation and table join manipulation

Explain one drawbacks and benefits of Internet enabled technology use by firms to augment information flow both within and between company departments, partners, and consumers?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd