SlideShare a Scribd company logo
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 1
Downloading and Installing Software
• yum
• pirut
• Bit Torrent
• rmp
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 2
yum
• Yellow Dog Updater, Modified
• Ready to use as installed
• Works with rpm packages
• Download from repositories
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 3
• yum update
• yum install whatever
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 4
pirut
• graphical interface to add or remove software
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 5
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 6
BitTorrent
• P2P – peer to peer
• Does not use a dedicated server
• tracker – server that allows client to communicate
with one anther
• peer – client that has downloaded part of the
BitTorrent file
• seed – has whole file and acts as an addition
source for the BitTorrent file
• collectively called a swarm
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 7
In this animation, the colored bars beneath all of the 7 clients in
the upper region above represent individual pieces of the file.
After the initial pieces transfer from the seed (large system at
the bottom), the pieces are individually transferred from
client to client. The original seeder only needs to send out
one copy of the file for all the clients to receive a copy.
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 8
RPM
• installs
• uninstalls
• upgrades
• queries and verifies rpm packages
• used by many different distributions
• keeps track of installed packages, version ,where
software packages are installed and the
dependencies between the packages
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 9
• software-2.3.4.rpm
• # rpm -i software-2.3.4.rpm
 to install
• # rpm -U software-2.3.4.rpm
 to upgrade
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 10
Chapter 16
• Administration Tasks
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 11
Figure 16-1 The User Manager window,
Users tab
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 12
Figure 16-2 The User Properties window,
User Data tab
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 13
Managing Users and Groups
•One of the key administrative tasks with Linux is
managing users and groups.
•The primary reason for user accounts is to verify the
identity of each individual using a computer system.
 A secondary reason for user accounts is to permit
the per-individual tailoring of resources and
access privileges.
• Resources can include files, directories, and
devices. Controlling access to these resources
is a primary task of an administrator
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 14
Groups tie together users that have a
common purpose.
 an organization may have persons responsible for
accounts payable and others responsible for payroll.
• By placing the user accounts in an accounts payable group
then common permissions can be given to all the members of
that group.
• Members of the accounts payable group would not have
access to the information and resources of the payroll group.
Users within the same group have the same read, write. or
execute privileges of group resources.
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 15
etc
•Several files are used when creating users in Linux. The
following are a few most commonly used.
/etc/passwd
/etc/shadow
/etc/group
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 16
/etc/passwd
• The /etc/passwd file contains the user ID, and
default home directory. Because this file is used
by many tools it needs to be readable by any user.
• To view the /etc/passwd file use the less
command.
less /etc/passwd
 The /etc/passwd file is a group of fields separated with a
colon (:). They are username, password (shown as an x),
numeric user ID, numeric group ID, full name, user’s
home directory, and user’s shell account.
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 17
/etc/shadow
•The /etc/shadow file contains the encrypted passwords and other password
information.
 This file is viewable by the root user only.
•To view the /etc/shadow file use the following commands:
su – root
tail /etc/shadow
•The /etc/shadow file is a group of fields separated with a colon (:). They are:
 Username
 password (13 characters encrypted)
 the number of days since the password was last changed
 the number of days before the password may be changed
 the number of days to warn a user of an expiring password
 the number of days after a password expires that account is disabled
 the number of days since an account has bee disabled
 a reserved field for possible future use.
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 18
Adding a User 1
•Use the useradd command to add a user. The syntax of the command
is displayed by typing the command alone.
useradd
•The most basic command to add a user named John Smith with and
user ID of jsmith is the following:
useradd jsmith
•If you view /etc/passwd after the add you will see that jsmith has been
added.
jsmith:x:501:501::/home/jsmith:/bin/bash
id:password(shadowed):Full Name:homeDir:shell
 The full name can be added with the –c option. useradd –c “John
Smith” jsmith
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 19
Adding a User 2
•When a user is added the home directory is not created automatically. It is
assigned but not created until the user logs in the first time. To force the
home directory to be created use the –m option. The following command will
create the jsmith user and create the associated home directory:
useradd –c “John Smith” –m jsmith
•View the jsmith user home directory with the command:
ls /home/directory
•Any files and directories that are in the /etc/skel directory are automatically
copied into the newly created home directory. If /etc/skel has no files or
directories (the default) then nothing is created.
•The /etc/skel directory on this Linux system has a Documents directory and a
Welcome file.
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 20
Adding a User 3
•A look at the /etc/shadow file shows that jsmith was added but a password
has not been assigned. The command to add a password is passwd. As root
you can change the password for jsmith with the following command:
passwd jsmith
•You will be asked to type the password and then repeat it to ensure it was
typed correctly. The root user can change any user password. A user can
change their own password by typing passwd without a user ID.
•passwd has options to configure the minimum password lifetime, maximum
password lifetime, and other options.
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 21
Deleting a User
•Deleting a user is done as the root user with the userdel command. To
delete the user jsmith use the command:
userdel jsmith
•Userdel has one option, -r, which removes the user’s home directory as well
as the account. To remove jsmith and the associated home directory,
/home/jsmith, use the following command:
userdel –r jsmith
•Once a user’s home directory is removed it would have to be restored from
backup to recover it.
•There may be orphaned files – files that are not associated by a valid user –
when you delete a user
 Example: jsmith was storing some files in /tmp. Those files are not deleted
when the user jsmith is removed. Those files in /tmp are now orphaned.
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 22
Adding a Group
•The mail file for groups is the /etc/group file. The file is a group of fileds that
describe the group and who is a member of it. The fields in order are the
group name, password (not used), numeric ID, and then a list of members
separated by a comma.
•A group is used to assign rights and permissions to users. For example, if
you have several files that should be made available to users in the Accounts
Payable department you could create an Accounts Payable group then add
users to the group. Once the group is populated then the permissions of the
file or directory can be changed to allow access by the group.
•To add a group use the groupadd command.
groupadd AccountsPayable
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 23
Assigning Users to a Group
•The usermod command is used to add users to a group.
 It also has options to change the home directory, change the shell, and other
values.
•To use usermod to add users jsmith and jdoe to the AccountsPayable group
type the following:
usermod –G AccountsPayable jsmith
usermod –G AccountsPayable jdoe
© 2006 ITT Educational Services Inc.
Linux Operating System :: Unit 3 :: Slide 24
Changing Group Permissions
•Groups can be used to assign privileges to resources, such as a directory.
 to change the group to AccountsPayable. This is accomplished with the
following command:
chgrp –R AccountsPayable AP
 Where –R causes it to recursively affect files and directories within the AP
directory, AccountsPayable is the new group, and AP is the name of the
directory.
 Permissions for group are then changed to give full read/write/execute access
with the chmod command.
chmod 775 AP

More Related Content

Similar to Week7. linux. operating. system. .ppt (20)

PPT
Introduction to Unix
Sudharsan S
 
PPSX
Unix environment [autosaved]
Er Mittinpreet Singh
 
PPT
Intro to linux systems administration
Padam Banthia
 
PPT
LINUX
ARJUN
 
PPTX
Linux Presentation
Muhammad Qazi
 
PDF
Unit 6 adding new users and storage
Bhushan Pawar -Java Trainer
 
PPT
User administration concepts and mechanisms
Duressa Teshome
 
PDF
Basics of Linux Commands, Git and Github
Devang Garach
 
PPSX
User Administration in Linux
SAMUEL OJO
 
DOC
58518522 study-aix
homeworkping3
 
PPTX
Using Unix Commands.pptx
Harsha Patil
 
PPTX
Using Unix Commands.pptx
Harsha Patil
 
PPTX
Linux+Command+Line+&+Shell+Scripting+Masterclass+-+Final.pptx
newscribduserly
 
PDF
Linux for CS Majors
worr1244
 
PPT
Linux
sravan kumar
 
PDF
Linux Fundamentals and how to use linux.pdf
xikel86509
 
PPT
chapter 3 linux-lecture.ppt
anwarkade1
 
PPTX
Introduction to Linux
Harish R
 
PPT
Unix Security
replay21
 
PDF
Users and groups in Linux
Knoldus Inc.
 
Introduction to Unix
Sudharsan S
 
Unix environment [autosaved]
Er Mittinpreet Singh
 
Intro to linux systems administration
Padam Banthia
 
LINUX
ARJUN
 
Linux Presentation
Muhammad Qazi
 
Unit 6 adding new users and storage
Bhushan Pawar -Java Trainer
 
User administration concepts and mechanisms
Duressa Teshome
 
Basics of Linux Commands, Git and Github
Devang Garach
 
User Administration in Linux
SAMUEL OJO
 
58518522 study-aix
homeworkping3
 
Using Unix Commands.pptx
Harsha Patil
 
Using Unix Commands.pptx
Harsha Patil
 
Linux+Command+Line+&+Shell+Scripting+Masterclass+-+Final.pptx
newscribduserly
 
Linux for CS Majors
worr1244
 
Linux Fundamentals and how to use linux.pdf
xikel86509
 
chapter 3 linux-lecture.ppt
anwarkade1
 
Introduction to Linux
Harish R
 
Unix Security
replay21
 
Users and groups in Linux
Knoldus Inc.
 

Recently uploaded (20)

PDF
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
PPTX
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PDF
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PPTX
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PDF
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
Ad

Week7. linux. operating. system. .ppt

  • 1. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software • yum • pirut • Bit Torrent • rmp
  • 2. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 2 yum • Yellow Dog Updater, Modified • Ready to use as installed • Works with rpm packages • Download from repositories
  • 3. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 3 • yum update • yum install whatever
  • 4. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 4 pirut • graphical interface to add or remove software
  • 5. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 5
  • 6. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 6 BitTorrent • P2P – peer to peer • Does not use a dedicated server • tracker – server that allows client to communicate with one anther • peer – client that has downloaded part of the BitTorrent file • seed – has whole file and acts as an addition source for the BitTorrent file • collectively called a swarm
  • 7. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 7 In this animation, the colored bars beneath all of the 7 clients in the upper region above represent individual pieces of the file. After the initial pieces transfer from the seed (large system at the bottom), the pieces are individually transferred from client to client. The original seeder only needs to send out one copy of the file for all the clients to receive a copy.
  • 8. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 8 RPM • installs • uninstalls • upgrades • queries and verifies rpm packages • used by many different distributions • keeps track of installed packages, version ,where software packages are installed and the dependencies between the packages
  • 9. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 9 • software-2.3.4.rpm • # rpm -i software-2.3.4.rpm  to install • # rpm -U software-2.3.4.rpm  to upgrade
  • 10. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 10 Chapter 16 • Administration Tasks
  • 11. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 11 Figure 16-1 The User Manager window, Users tab
  • 12. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 12 Figure 16-2 The User Properties window, User Data tab
  • 13. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 13 Managing Users and Groups •One of the key administrative tasks with Linux is managing users and groups. •The primary reason for user accounts is to verify the identity of each individual using a computer system.  A secondary reason for user accounts is to permit the per-individual tailoring of resources and access privileges. • Resources can include files, directories, and devices. Controlling access to these resources is a primary task of an administrator
  • 14. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 14 Groups tie together users that have a common purpose.  an organization may have persons responsible for accounts payable and others responsible for payroll. • By placing the user accounts in an accounts payable group then common permissions can be given to all the members of that group. • Members of the accounts payable group would not have access to the information and resources of the payroll group. Users within the same group have the same read, write. or execute privileges of group resources.
  • 15. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 15 etc •Several files are used when creating users in Linux. The following are a few most commonly used. /etc/passwd /etc/shadow /etc/group
  • 16. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 16 /etc/passwd • The /etc/passwd file contains the user ID, and default home directory. Because this file is used by many tools it needs to be readable by any user. • To view the /etc/passwd file use the less command. less /etc/passwd  The /etc/passwd file is a group of fields separated with a colon (:). They are username, password (shown as an x), numeric user ID, numeric group ID, full name, user’s home directory, and user’s shell account.
  • 17. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 17 /etc/shadow •The /etc/shadow file contains the encrypted passwords and other password information.  This file is viewable by the root user only. •To view the /etc/shadow file use the following commands: su – root tail /etc/shadow •The /etc/shadow file is a group of fields separated with a colon (:). They are:  Username  password (13 characters encrypted)  the number of days since the password was last changed  the number of days before the password may be changed  the number of days to warn a user of an expiring password  the number of days after a password expires that account is disabled  the number of days since an account has bee disabled  a reserved field for possible future use.
  • 18. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 18 Adding a User 1 •Use the useradd command to add a user. The syntax of the command is displayed by typing the command alone. useradd •The most basic command to add a user named John Smith with and user ID of jsmith is the following: useradd jsmith •If you view /etc/passwd after the add you will see that jsmith has been added. jsmith:x:501:501::/home/jsmith:/bin/bash id:password(shadowed):Full Name:homeDir:shell  The full name can be added with the –c option. useradd –c “John Smith” jsmith
  • 19. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 19 Adding a User 2 •When a user is added the home directory is not created automatically. It is assigned but not created until the user logs in the first time. To force the home directory to be created use the –m option. The following command will create the jsmith user and create the associated home directory: useradd –c “John Smith” –m jsmith •View the jsmith user home directory with the command: ls /home/directory •Any files and directories that are in the /etc/skel directory are automatically copied into the newly created home directory. If /etc/skel has no files or directories (the default) then nothing is created. •The /etc/skel directory on this Linux system has a Documents directory and a Welcome file.
  • 20. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 20 Adding a User 3 •A look at the /etc/shadow file shows that jsmith was added but a password has not been assigned. The command to add a password is passwd. As root you can change the password for jsmith with the following command: passwd jsmith •You will be asked to type the password and then repeat it to ensure it was typed correctly. The root user can change any user password. A user can change their own password by typing passwd without a user ID. •passwd has options to configure the minimum password lifetime, maximum password lifetime, and other options.
  • 21. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 21 Deleting a User •Deleting a user is done as the root user with the userdel command. To delete the user jsmith use the command: userdel jsmith •Userdel has one option, -r, which removes the user’s home directory as well as the account. To remove jsmith and the associated home directory, /home/jsmith, use the following command: userdel –r jsmith •Once a user’s home directory is removed it would have to be restored from backup to recover it. •There may be orphaned files – files that are not associated by a valid user – when you delete a user  Example: jsmith was storing some files in /tmp. Those files are not deleted when the user jsmith is removed. Those files in /tmp are now orphaned.
  • 22. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 22 Adding a Group •The mail file for groups is the /etc/group file. The file is a group of fileds that describe the group and who is a member of it. The fields in order are the group name, password (not used), numeric ID, and then a list of members separated by a comma. •A group is used to assign rights and permissions to users. For example, if you have several files that should be made available to users in the Accounts Payable department you could create an Accounts Payable group then add users to the group. Once the group is populated then the permissions of the file or directory can be changed to allow access by the group. •To add a group use the groupadd command. groupadd AccountsPayable
  • 23. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 23 Assigning Users to a Group •The usermod command is used to add users to a group.  It also has options to change the home directory, change the shell, and other values. •To use usermod to add users jsmith and jdoe to the AccountsPayable group type the following: usermod –G AccountsPayable jsmith usermod –G AccountsPayable jdoe
  • 24. © 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 24 Changing Group Permissions •Groups can be used to assign privileges to resources, such as a directory.  to change the group to AccountsPayable. This is accomplished with the following command: chgrp –R AccountsPayable AP  Where –R causes it to recursively affect files and directories within the AP directory, AccountsPayable is the new group, and AP is the name of the directory.  Permissions for group are then changed to give full read/write/execute access with the chmod command. chmod 775 AP