0% found this document useful (0 votes)
20 views5 pages

Operating System Tools-3

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

Unit 2: Red Hat Linux 9 Basics

We can find the permissions of a given file by making use of the ls program.

Notes

Example: Here, we will use the command ls l in order to display a long version of the
file information:
$ ls l /usr/bin/top
rxrxrx

root

root

56406 Sep 1215:50 /usr/bin/top

We can represent the read, write, and executable permissions by making use of the characters
r, w, and x respectively. The first part (for example, the expression rxrxrx, as shown in
the above example) signifies the file permissions. The first character signifies the file type. This
sequence comprises of three sets of three characters, that is, one set each to depict permissions of
the owner, the group, and the others.
Example: The sequence rx signifies that only the read and execution permissions are
set. No write permission is available. Thus, this file permission specifies that every possible user
can just read and execute the file content but not modify the contents of the file.
In order to modify the permissions of files and directories, we can make use of the CLI tools such
as chmod, chown, and chgrp.

2.7.3 Concept of Managing Users


By means of the Red Hat user configuration tool, that is, redhatconfigusers, we can
accomplish the task of adding, removing, and modifying user accounts on the system in a GUI.
This tool can be launched by selecting Main Menu System Settings Users and Groups. In
Figure 2.26, we have shown the primary interface of this tool.
Figure 2.26: Managing Users

It is required to provide the root password in order to use this utility. We can add, edit, or modify
users and groups by making use of this interface.
We can perform the same operations in the CLI also. The different tools used are given below:

LOVELY PROFESSIONAL UNIVERSITY

47

Operating System Tools

Notes

Table 2.3: Different Tools

Self Assessment
Fill in the blanks:
14.

A ................................... should use system as a less privileged user.

15.

The first character signifies the ...................................

2.8 Summary
zz

Red Hat Linux now makes use of the CUPS (Common UNIX Printing System) as the
default printing system. It also includes the Native POSIX Thread Library, which provides
improvements in performance with Pentium Pro processors or better.

zz

Applications that we can run from the Desktop are to be found either from the Main Menu
(and sub-menus therein), or as icons on the Panel and the Desktop itself.

zz

A file system is an organization of data and metadata on a storage device. With a vague
definition like that, you know that the code required to support this will be interesting.

zz

We can navigate the file system by means of either a GUI file explorer (for example,
Nautilus) or the terminal.

zz

The installation process of Red Hat Linux automatically attempts to identify the existing
hardware and configure it so as to use in the desktop.

zz

GNOME is a powerful but simple desktop environment with a strong focus on usability,
accessibility, and internationalization.

zz

The GNOME Control Center allows you to configure various parts of your GNOME system
with different tools called capplets.

zz

A process is defined as an independent program entity which executes and makes use of
computer resources like CPU time and memory.

2.9 Keywords
File system: A file system is an organization of data and metadata on a storage device.
GNOME Control Center: The GNOME Control Center allows you to configure various parts of
your GNOME system with different tools called capplets.
GNOME: GNOME is a powerful but simple desktop environment with a strong focus on
usability, accessibility, and internationalization.
Panel: This sub-option configures the behavior of the panel in the desktop. You can opt to disable
the animation of panels in the desktop or to change their animation speed.

48

LOVELY PROFESSIONAL UNIVERSITY

Unit 2: Red Hat Linux 9 Basics

Process: A process is defined as an independent program entity which executes and makes use
of computer resources like CPU time and memory.

Notes

Run level: A run level is a state of the machine, which determines the processes to be run.
Sessions: This sub-option allows you to configure the behavior of the GNOME desktop for
maintaining states between successive log-in sessions.

2.10 Review Questions


1.

Discuss the Red Hat Linux desktop menus in details.

2.

Explain the working of workspace switcher and how to use it.

3.

Discuss the process of running program in Red Hat Linux.

4.

How to use the panel in Linux? Discuss.

5.

What are the advantages and disadvantages of CLI?

6.

Explain the using process of the file system hierarchy.

7.

What do you understand by navigating in the file system?

8.

How to change the current directory in Linux?

9.

Find the information of any existing hardware device in Red hat.

10.

Explain the process of configuring the desktop.

Answers: Self Assessment


1. sub-menu.

2. Panel

3. Applets

4. Launchers

5. Links

6. /sbin

7. hardware browser

8. Superuser

9. GConf

10. Caplets

11. Desktop

12. Process

13.

kill signal

14.

15.

file type

system administrator

2.11 Further Readings


Books
Books
Christopher Negus, Linux Bible, Wiley.

Ellen Siever, Aaron Weber, Stephen Figgins, Robert Love and Arnold Robbins,
Linux in a Nutshell, OReilly Media.

Wale Soyinka, Linux Administration: A Beginners Guide, McGraw-Hill Osborne


Media.

LOVELY PROFESSIONAL UNIVERSITY

49

Operating System Tools

Notes

Dee-Ann LeBlan and Richard K. Blum, Linux for Dummies.

Brian Ward, How Linux Works, No Starch Press.

Online links http://www.redhat.com/mirrors/LDP/LDP/intro-linux/intro-linux.pdf

http://www.linuxtopia.org/online_books/linux_beginner_books/redhat_9_
getting_started_guide/ch-basics.html

http://redhat.activeventure.com/9/customizationguide/ch-intro.html

50

http://searchitchannel.techtarget.com/feature/Managing-Linux-hardwareand-the-kernel-Introduction

LOVELY PROFESSIONAL UNIVERSITY

Unit 3: Connecting to the Internet

Unit 3: Connecting to the Internet

Notes

CONTENTS
Objectives
Introduction
3.1

3.2

3.3

Connecting to the Internet


3.1.1

Networking Overview

3.1.2

Configuring an Internet Connection

Managing Multiple ISPs and Connections


3.2.1

Outbound Traffic Using Multiple Connections to the Internet

3.2.2

Inbound Traffic Using Multiple Connections to the Internet

Software and Configuration


3.3.1

The Mozilla Web Browser

3.3.2

gFTP Client

3.4

Summary

3.5

Keywords

3.6

Review Questions

3.7

Further Readings

Objectives
After studying this unit, you will be able to:
Describe the concept of using Red Hat Linux to connect to the Internet
Discuss managing multiple ISPs and connections
Explain the concept of software and configuration

Introduction
In this unit, we will discuss how to use Red Hat Linux to connect to the Internet via a telephone
dialup, ISDN (Integrated Services Digital Network), DSL (Digital Subscriber Line), Ethernet,
or wireless connection. We will give an overview of networking and discuss how to use the
Network Administration Tool. Network Administration Tool is an X-based program that makes
it easy to connect to the Internet via an Internet Service Provider (ISP). Also, we will discuss
several popular network client applications available under Linux, including the Mozilla web
browser, the email client, and a graphical FTP client.

3.1 Connecting to the Internet


In this section, we will discuss how to use Red Hat Linux to connect to the Internet.

3.1.1 Networking Overview


Nowadays, most computers handle network traffic much like the post office handles mail.

LOVELY PROFESSIONAL UNIVERSITY

51

You might also like