![]() For various reasons, advanced Linux users can choose alternative shells such as the Korn Shell ( ksh), the C Shell ( csh), etc. A command prompt, or prompt login, which is symbolized by a # for administrators and a $ for other users ( /etc/profile).ĭepending on the security policy implemented on the system, the password will require a certain number of characters and meet certain complexity requirements.Īmong the existing command interpreters, the Bourne-Again Shell ( /bin/bash) is the one most frequently used.A password, which is encrypted before being stored ( /etc/shadow).In other files the user will be defined by: A connection directory, e.g., the home directory.A command interpreter, e.g., a shell, which can be different from one user to another.A group identifier: GID (Group Identifier). ![]() A numeric identifier: UID (User Identifier).A login name, more commonly called "login", containing no spaces.The user of a Linux system will be defined in the /etc/passwd file, by: Learning these commands allows the administrator to connect to a Linux terminal, to manage its resources and files, to identify the station, the terminal, and the connected users, etc. In order to preserve server resources, the graphical interface is either not installed or launched on demand.Remote administration is done on the command line with an SSH terminal.It can happen that the system does not start correctly but that a backup command interpreter remains accessible.The majority of system commands are common to all Linux distributions, which is not the case for graphical tools.However, it is important to be able to use the interface in command line mode for several reasons: Objectives: In this chapter, future Linux administrators will learn how to:Ĭreate a text file, display its contents and modify it.Ĭurrent Linux systems have graphical utilities dedicated to the work of an administrator. In this chapter you will learn Linux commands and how to use them. NoSleep.sh - A simple Configuration Script Verifying DISA STIG Compliance with OpenSCAP - Part 2 Host-based Intrusion Detection System (HIDS)īash - Conditional structures if and case ![]() Building and Installing Custom Linux KernelsĪutomatic Template Creation - Packer - Ansible - VMware vSphere
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |