Professional Documents
Culture Documents
Ux 101
Ux 101
www.digitalthink.com
Linux growth Linux is fast growing in popularity as a server for the Web:
in commercial Internet Service Providers, corporate intranets, e-commerce
use sites, and other commercial applications. Even IT executives
who in the recent past shunned Open Source Software
(OSS), are beginning to understand that Linux is a powerful,
robust operating system for business-critical server roles, and
is also increasingly accessible to the desktop users.
Thirdly, this course teaches you how to work with all the
major commands and features of Red Hat Linux. You will
learn which commands to use and how to edit system files in
order to optimize your system. You will learn how
permissions work and why they are fundamental to your
understanding of the power of Linux. You'll learn about the
packages that come with Red Hat, and how they are used.
Lastly, we'll discuss the networking utilities available to the
power user, and how you can use these to automate your
system, to make time for exploring and learning more about
what Linux has to offer.
Course goals After completing the course, you will be able to:
● Install Red Hat Linux on standard and nonstandard
hardware
● Navigate and use the Linux filesystem
The series This course, Introduction to Red Hat Linux I, is the first of
two courses in the Introduction to Red Hat Linux Series (RH
033). Introduction to Red Hat Linux I explores the Linux
installation process, how Linux sees the files and directories
on its hard drive, and how Linux handles multiple users.
Specifically, it teaches you how to install Linux, navigate the
filesystem, work as a user, and manipulate the filesystem.
Series features The following features are included in this series to better
prepare you to apply your skills in a real-world environment.
Easy On the Resources page, you will find a folder titled Easy
Reference Reference. The Easy Reference folder contains a variety of
checklists, tables, and questions that are presented or
mentioned in the course.
You can print these resources as they are mentioned in the
course, or you may download them all at once from the
Resources page, where they are listed by topic.
Your first lab When you're working in the lab, you will be working in your
exercise home directory. In order to get you started, we've set up your
filesystem for you with files and directories in your home
directory.
Next lesson In the next lesson, you'll learn more about the origins of
Linux, the history of Red Hat, and more about why Linux
has grown so rapidly, including background on the Free
Software Foundation and the GNU Public License (GPL).
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using the Linux labs
Use the Linux labs.
About the
Linux labs
In order to use the lab feature, you need to connect to it
using an SSH (Secure Shell) client. You'll learn more about
SSH in this lesson.
Creating your Before you use the lab, you'll need to create your account.
account You do this by clicking on the Create Account button. An
account will be created for you, using your DigitalThink user
name and password. In order to keep our system secure, you
may be required to change your password when you log on.
Be sure to make a note of your password!
Click the Create Account button below now to create your
Linux account.
Transcript
Your first lab When you're working in the lab, you will be working in your
exercise home directory. In order to get you started, we've set up your
filesystem for you with files and directories in your home
directory. Click the View Image button now to see what the
arrangement looks like.
This arrangement will begin to make sense as you learn to
navigate the Linux file structure.
Next lesson In the next lesson, you'll learn more about Red Hat®, Open
Source Software (OSS), and the GPL.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course introduction
Open Source Software (OSS)
Open Source Software (OSS) means that the source code as
well as the binary (the actual program you run) is accessible
and distributed freely.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course introduction
Red Hat® certification
Introduction to Red Hat® Linux I is the first course of a
two-part series, titled Introduction to Red Hat Linux.
This series will complete your preparation for the next
four-part series in the Red Hat curriculum, Red Hat Linux:
System Administration.
For more information on other courses that can help you gain
Red Hat certification, please visit the course catalog page.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introduction to Red Hat® Linux and the
GPL
Explain the origin of Red Hat Linux and the Open
Source Software movement.
GNU General Open Source Software (OSS) can be freely seen, modified,
Public License and improved by anyone who uses it. Linux was created this
way. So was the Internet--a technology owned by no one,
and to which everyone can contribute. Linux is considered
free software, but it is not in the public domain. It adheres to
the GNU General Public License (GPL), which says that it
can be freely distributed or even sold, but must always be
accompanied by its source code as well as a copy of the
GNU GPL license.
OSS and GPL The concepts of free software that costs nothing and free
software that everyone can view are often confused. OSS is a
more recent phenomenon than free software. As it is
currently defined by the GNU GPL, "free" software does not
necessarily mean it costs nothing. On the contrary, while
distributing software covered by this license a vendor must
make the source code freely available to the buyer, but it can
charge a fee for the distribution media and the vendor
services and support that it also provides.
How the GPL The GPL allows anyone to modify the source code covered
works by the license, and to distribute derived products as long as
the original source is made available. Open Source Software
(OSS) gives users the ability to modify the code to suit their
own needs, which is not possible with proprietary software
code.
Red Hat, Inc. Red Hat, Inc. is the largest Open Source company in the
and Red Hat world. Red Hat was founded on the belief that the open
Linux discourse of ideas holds the greatest potential for business
and human development.
Red Hat introduced its comprehensive package-based
distribution of Linux and Linux resources in 1994. Since
then, Red Hat Linux has grown to be the most popular and
widely used Linux distribution. Red Hat Linux and the
Apache Web server are especially popular with Internet
Service Providers and for other network resources and roles.
Red Hat supports the growth and evolution of Linux by
employing more Linux developers and open source engineers
than any other company, and committing large resources to
developing open source code while continuing to adhere to
the GPL.
This is just one of many ways in which Red hat distinguishes
itself from other companies and products on the market. Red
Hat is the leading Linux and open source company providing
enterprise-class support and services, consulting, training,
and technology alliances with all the leading hardware and
software OEMs.
The Red Hat Red Hat's distribution of Linux includes installation and
distribution configuration software, the latest version of the Linux kernel,
and common utilities and applications.
Red Hat adds value to the base Linux components by
packaging, engineering, QA, and other product quality
assurance methods. Red Hat backs up the Red Hat Linux OS
with comprehensive technical support and a complete range
of services, training, and consulting. Because of the large
installed base of Red Hat Linux systems around the world
Red Hat acts as a standardizing force in the diverse Linux
community.
Linux for the Recently there has been a focus on making Linux more
desktop functional for non-technical users. This has been
accomplished with desktop environment efforts for GNOME
and KDE, two easy to configure graphical environments
available in Linux. These projects make the Linux desktop
more accessible, allowing someone who has little experience
outside of Microsoft Windows to be comfortable in the
Linux environment.
Next lesson In the next lesson, you'll learn about prerequisites to this
course.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Access the Linux labs using SSH
Using the Linux labs (Simulation
transcript)
1. Click in the host window and type in the name of the
machine you are connecting to:
labs2.digitalthink.com. Although Telnet is selected
by default, we are using SSH. Select the SSH radio
button and notice that the TCP port changes.
2. Because SSH runs on a different port, the port has
switched automatically. Click Open.
3. This shows the SSH authentication screen. For
purposes of this simulation, enter the user name
redhat, and hit Enter to move to the next line.
4. For security reasons, when you enter your passphrase
(or password), it does not appear on the screen. In our
example, the passphrase has been entered for you. Hit
Enter to continue.
5. You are now connected to the labs. When you are
ready to disconnect, click the x in the top right corner
of the screen to exit the program.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Prerequisites
Verify you have the right background for this
course.
You need not have any experience with Linux to take this
course.
However, you should have some familiarity with computers.
To get the most out of this course, you should be able to use
a mouse and the keyboard, and understand the basics of PC
hardware.
More specifically, you should have experience with
Microsoft Windows or another operating system.
If you do not have this experience, you should at least have a
rudimentary understanding of the following concepts:
● Data (information) is stored on a hard drive.
Next lesson In the next lesson, you'll learn what you need to take this
course.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introduction to Red Hat® Linux and the GPL
About GNU GPL
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introduction to Red Hat® Linux and the GPL
GPL and the Free Software Foundation
The GNU General Public License (GPL) was developed in
1991 by Richard Stallman, an advocate of free software who
founded the Free Software Foundation (FSF).
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introduction to Red Hat® Linux and the GPL
The Linux community of developers
Linux consists of a worldwide community of developers who
have written drivers, features, and new functions--all
working under the GNU GPL. These developers all
communicate via the internet, exchanging ideas, methods,
code, and expertise. The internet itself is powered by data
communications protocols (IP, TCP, UDP, DNS, HTTP, etc.)
which are themselves open source, based on open standards.
Linux and open source power the Internet and in turn the
Internet powers Linux and open source development.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introduction to Red Hat® Linux and the GPL
Benefits of a packaged distribution
Many Linux packages must have co-requisite requirements
that demand dependencies: some packages depend on others,
while other packages such as programming libraries are
critical to basic system functionality. In 1994, Red Hat®,
Inc. has devised a scheme called RPM, the Red Hat Package
Manager, to transparently handle package installation,
removal, upgrades, and dependencies for a system
administrator.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
What you need
Learn what you need to take this course.
Platform
support
You can take this course on Windows, Macintosh, or UNIX
platforms. However, to complete the exercises in this course,
you will need to access the lab feature.
Download Red You can download the Red Hat Linux operating system for
Hat® Linux for free from ftp.redhat.com. But be warned: the Red Hat servers
free stay pretty busy. If you can't connect, or want to download
from a site closer to you, try one of the many mirror sites
around the world. A link to the mirror sites can be found on
the Resources page.
Purchase Red Alternatively, if you'd rather not make decisions about which
Hat Linux components to download--a process that is time consuming
and requires intimate knowledge of the hardware
environment into which Linux is to be introduced--you can
buy the CD-ROM, and have it delivered to your doorstep.
There are several advantages to purchasing a boxed set of the
Red Hat Linux operating system. They include the following:
● Service and support: A variety of options are
available.
● Software: This includes both the Red Hat Linux CD
and the Red Hat Linux source code CD.
Next lesson In the next lesson, you'll learn about course resources.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course resources
Explore course resources.
Resources and You can find Web links, printable tables, lists of
Help pages hardware-compatibility standards, installation checklists, and
recommended textbooks for this course on the Resources
page. Remember, you can reach the Resources page at any
time throughout the course by clicking the Resources button
on the toolbar. And if you have questions, assistance is
always available on the Help page.
Course file You can download the entire course from the Resources
page. This file provides the lesson, quiz, and exercise content
so you can read and review the course material offline at
your convenience. Although this file is not required to
complete this course, we strongly recommend that you
review the course material offline, and practice what you've
learned in a live environment.
Next lesson In the next lesson, you'll learn about your learning
community.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Your learning community
Find out about the members of your learning
community.
Learn from
other students
As you proceed through this course, you'll have ample
opportunity to communicate with other students taking this
very course. There are four principal ways to access this
virtual community. These are described in the table below:
Method Description
Chat Talk with other students who are visiting the Chat area at
the same time, or even schedule a time for an online study
group.
Tutors Another way to share your ideas and get feedback on the
work you do in this course is through your tutors. The course
tutors are experts in the subject of this course. They may
review your exercise submissions and respond to them by
email if the exercises so require. You can also email the
tutors whenever you have a question or get stuck in a lesson
or exercise.
How to send Let's walk through the process of sending email to your
email to the course tutors.
tutors 1. Click the Tutor button on the toolbar.
2. The WebMail page appears. Type something in the
Subject field.
3. Type your email message in the Message field.
4. Click the Send Message button. The WebMail
response page appears.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course resources
Copying and pasting on UNIX platforms
All the text files you need to get started on course exercises
are included in the download file available on the Resources
page. Open the text file in your text editor and make any
modifications necessary to complete the exercise. Save the
file under a different name.
From text Once you have the exercise solution in a text file, you're
editor to ready to submit your solution to the course tutors.
browser
Some configurations of UNIX operating systems make it
difficult or impossible to copy and paste between
applications. To work around this, you'll need to open your
exercise solution text file in your Web browser, select and
copy the text, then paste it into the exercise submission text
area of the learning environment.
How to... If you find you cannot cut and paste text from one
application to another, follow the steps listed below.
1. When you are ready to submit an exercise solution,
navigate to the appropriate exercise page in the course
using the course syllabus. You'll notice a text box in
which you'll want to paste your exercise solution.
2. From the File menu in your browser, choose the Open
Page option. The Open Page dialog box appears.
3. Click the Choose File button. The Choose File dialog
box appears.
4. Navigate to the appropriate directory and select your
exercise solution text file. The name of your text file
will now appear in the Open Page dialog box.
5. Click the button that opens the page in your browser.
The text file will now appear in the browser window.
6. Select the text of your exercise solution and choose the
Copy option from the Edit menu.
7. Click the browser's Back button to return to the course
Exercise page.
8. Position your mouse cursor in the exercise submission
text box, click the mouse, and then select Paste from
the Edit menu. Your solution text is now ready to be
submitted to the tutors.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Meet your instructors
Get to know your instructors, Dee-Ann LeBlanc and
Matt Bacchi.
Next lesson In the next lesson, you'll learn about the course project.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The course project
Learn about the project you will be completing at
the end of this course.
● Online resources
● Planning strategy
You will find these in the Resources file, which looks like
the one below.
With each response, you will get feedback from a tutor about
your solutions to the problems presented.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Meet your instructors
Welcome! (Audio transcript)
Welcome to the world of Linux! In this course, you'll
learn about commands you'll need to operate and navigate
your Linux system. Whether or not you have some
experience with Linux or UNIX or are starting from scratch,
this course will give you a comprehensive overview of the
commands you'll need to use to maintain your system. In
addition, we have provided numerous checklists, tables, and
sites that will round out your learning.
We strongly recommend that you review this material
offline, and practice these commands in a live environment.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Installing Red Hat Linux
Module introduction
If you like working with computers, chances are you'll love
working with Linux! This highly customizable operating
system invites you to get under the hood and tweak things as
much as you'd like. This is one of the reasons Linux is a
challenge to work with, but also what makes it so exciting.
Linux has strong ties to open source, and this is one of the
reasons for its surge in popularity. Another reason is that
installing Red Hat® Linux has become far easier than the
days when the files had to be positioned by hand.
In the past, Linux required the user to be familiar with the
complexities of the system in order to install it successfully.
While the growing number of tools and utilities available for
users can make software selection a daunting task, the actual
installation of Red Hat Linux today is a pretty
straightforward process.
The secret of a successful install is to know some basic
information about the hardware and to understand the
importance of planning in order to avoid common mistakes.
Once you are comfortable within the Linux operating system,
and realize how much fun Linux is, you will want to see
what other tools are available.
This module introduces you to Linux, and teaches you what
you need to know in order to successfully complete a Red
Hat Linux installation.
After completing this module, you will be able to:
● Describe hardware compatibility issues
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Hardware compatibility
Describe hardware compatibility issues.
Hardware
compatibility
Although most hardware available for the PC platform is
requirements Linux-compatible, the importance of planning your Linux
installation cannot be overemphasized. A successful
installation is directly related to how well you know your
hardware.
Planning your Verifying that your hardware is compatible can save you
installation undue stress in installing your system. However, it is
important to do this before (and not during) the installation
process. The best place to find out about hardware
compatibility with Linux is to start with the Hardware
Compatibility Guide, which contains a complete list of
Linux-compatible hardware. By carefully consulting this list
early on, you avoid having to replace newly purchased items
that are incompatible with your system. In addition to the
Hardware Compatibility Guide maintained by Red Hat®,
Inc., there is the Hardware-HOWTO document.
If you intend to use the GUI interface heavily, you will want a
faster machine (faster CPU) with more RAM than the minimum
recommended specification.
Doing your Although you will learn about the actual Linux installation
research: tips process in more detail later in this module, there are certain
on trouble- hardware-related issues to consider in planning your
free installation.
installation
As you now know, one way to avoid installation problems is
by consulting the Hardware Compatibility Guide. Another is
to avoid devices that are likely to be incompatible with your
system. These might include:
● Very new devices incorporating very new technology
Next lesson As you may have guessed, the most popular install method
for Red Hat users is the CD-ROM. In the next lesson, you'll
learn more about the installation boot diskette mentioned
earlier, such as when you need it and when you can do
without it.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Creating an installation boot diskette
List the steps to create an installation boot
diskette.
Installing from
CD-ROM
As we've seen, there are multiple ways to install Linux.
Regardless of whether you boot from a disk or the CD-ROM
itself, the most convenient, the fastest, and by far the most
common method of Linux installation is to use a CD-ROM.
If a Linux-compatible CD-ROM drive is not available, there
are many other options for installing Linux.
Booting from If you don't have a CD-ROM drive, you can boot from a
an installation specially created boot diskette to begin the installation
disk process. As we learned in an earlier lesson, in order to
complete the install, you'll need drivers for common devices;
the system will need to retrieve these from the boot diskette.
If you're installing on a laptop and are using an external
CD-ROM drive, you'll be using something called a PCMCIA
device, and will need a second diskette.
Be sure after the installation that you change the BIOS back to
booting from the other drives.
Transcript
Quiz
Before moving on to the next lesson, click the Quiz button to
test your understanding of Linux and hardware compatibility.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Creating an installation boot diskette
Determining what your hardware is
How do you determine what hardware you have? There are
four methods that you can use to determine exactly what
hardware you have in your machine. These methods are
listed in more detail below.
The device If you have Windows 95 or 98 installed you can find your
manager tab hardware under Device manager tab in the system properties
from control panel. This saves you the trouble of opening
your box and may give enough information for a linux
install.
Check your If you still have the receipts from the purchase of your
receipts machine, there may be an itemized list of what you have
installed. Be careful of this method, though. These lists are
not always accurate. If you get your information this way and
the installation process does not work as expected, you may
need to use another method to double-check the hardware in
the machine.
Consult the An alternate way of seeing what you have is to look at the
manual manuals that came with the computer. This method, of
course, requires that you still have the manuals and that you
can still find them. Also bear in mind that sometimes
manufacturers use the same base manual for a number of
different models. This is a problem. While it narrows down
your information, the base manual is not of much use if you
do not know exactly which model you have. At the very
least, you can play with your settings and try those for each
model until you get things working.
Search the Internet search engines are also a good place to turn to. If
Web there is no specific model information, but there is some kind
of numeric code on the hardware, then you can try doing a
Web search on that code and seeing if it turns up anything
instructive.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Creating an installation boot diskette
Minimum hardware requirements for
Linux
The minimum hardware requirements for Linux are
described below.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux installation methods and
installation types
Describe Linux installation methods and
installation types.
Linux If you're installing Linux for the first time on your machine,
installation you're doing a direct install. Once the installation medium
methods has booted, a selection screen is displayed. From this screen,
you may choose the most convenient and appropriate method
to install Linux, as shown in the View Image.
Choosing the The default method is a graphical install. This will start
default method automatically if after one minute the user has made no entry.
Alternatively, you can invoke this method simply by pressing
Enter at the boot: prompt. There is also a text-based
method. For purposes of this course, we will concentrate on
the graphical installation method.
Installation The steps to initiate a direct install in graphical mode are as
steps follows:
1. Simply press Enter at the boot: prompt. By pressing
Enter at the boot: prompt, you will boot the kernel
and then start an X server to continue with the
GUI-based installation.
If you need help in selecting the correct option, use the contextual
help in the left pane. To switch off this feature, click the "? Hide
Help" button.
The Any time you see partition size referred to with the terms
"growable" "remaining space" or "of at least", that partition's size is not
option firmly set. This "growable" option is only invoked for
partitions that do not have to conform to a specific base size;
it is especially useful when you know the minimum partition
size but would like to allocate more space to some partitions.
The "growable" option is really a way of saving you from
doing exact calculations.
How the Here's how the "growable" option works. Once all of the
"growable" partition base sizes are accounted for, you may be left with
option works room for Linux either on your hard drive(s) or in the areas
you've set aside for Linux. If there is room left over, the
installer resizes or "grows" the partitions that are "growable"
so that they take up all of the remaining space that is
available for Linux. However, when you are doing one of the
Workstation or Server installs, you do not get to choose
which partitions are growable unless you partition the drive
yourself.
You would not use growable for the /boot or swap partition.
Package You might be curious about how long it takes for each of the
installation installation methods to complete. There are a number of
speed issues involved with package installation speed:
● The speed of your CPU
Next lesson Partitioning your hard drive provides a way to divide the
contents of your Linux file system and to share a hard drive
between multiple operating systems. We'll discuss the
various methods of partitioning your hard drive in the next
lesson.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete an exercise on installation methods.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Creating an installation boot diskette
Editing your BIOS to boot from a
CD-ROM
Editing your If you wish to boot from the CD-ROM (or find out if it is
BIOS possible for you to do so), you need to edit the machine's
initial boot instructions, which are contained in the BIOS.
To edit your BIOS:
1. Reboot your machine.
2. Follow the instructions for entering Setup or BIOS;
this usually means pressing the Delete key.
3. Find the option set that contains the boot-order setting.
Often this menu choice is BIOS FEATURES SETUP.
4. Find the specific option that you need to set. You can
recognize it by its listing of drive letters. Often, this
option is Boot Sequence.
5. Change the boot sequence so the CD-ROM drive is
listed first.
6. Save and exit the BIOS. The machine will reboot and
check the CD-ROM drive before any other drive,
allowing you to boot from this drive.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Creating an installation boot diskette
Building a Linux boot disk in Windows
1. Insert the Red Hat CD-ROM into the CD-ROM drive.
2. Insert a floppy disk into the floppy disk drive.
3. Open the Explorer file manager in Windows.
10. When the title bar for the DOS window says Finished
and the disk drive stops whirring, the write is done.
You can take out the CD-ROM and the floppy now.
Label the floppy as the installation boot disk.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Creating an installation boot diskette
Creating an installation boot diskette
(FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
Hardware compatibility
Each question is worth one point. Some questions ask you to select the best
answer, others ask you to select all the correct answers. To receive credit for
questions asking for all the correct answers, you must select all the correct
answers and only the correct answers.
1. Which of the following tools can you use to create a boot floppy in Linux?
Please select all the correct answers.
A. cat
B. rawrite
C. dd
D. fdisk
E. Disk Druid
2. What settings do you have to edit in order to be able to boot from the
CD-ROM drive?
Please select the best answer.
A. CMOS
B. RAM
C. VRAM
D. BIOS
4. Of the answers listed below, which is the first to address when preparing to
install Linux?
Please select the best answer.
A. Check your hardware against the Hardware Compatibility List
B. Set your BIOS to disable Plug and Play
C. Set your BIOS to boot from the CD-ROM
D. Add a new hard drive for Linux
5. Of the Linux installation methods listed, which is the most common for a
standalone machine?
Please select the best answer.
A. NFS
B. CD-ROM
C. HTTP
D. FTP
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The Workstation dual-boot system
List the considerations for a dual-boot system
The
Workstation
As you know, it is possible to install Linux and Windows
dual-boot on the same machine. This means that you can boot either
system into Linux or Windows--or any other operating system
sharing the hard drive(s). This is done using LILO, the Linux
Loader, or another boot manager.
In this example, to get Linux into this space, you would need
to do a Custom install. To do a GNOME Workstation install,
you would need to add a new hard drive.
Rearranging How should I re-arrange the hard drive? If you are adding
your drive for Linux on a hard drive that already has Windows installed,
dual-boot with then you need to group all of the Windows data before you
FIPS start setting aside space for Linux partitions. FIPS is a useful
tool that can non-destructively rearrange your drive for you.
FIPS comes with Linux and is also available on the Internet.
Check the Resources page for a link to a site where you can
download the FIPS tool.
Using LILO: The final question to ask is, "Should I reinstall Windows
installing or before I install Linux?" Regardless whether you are installing
reinstalling or reinstalling Windows on your dual-boot machine, you
Windows should always install Windows before you install Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux installation methods and installation types
Direct vs. upgrade install
Direct install: A direct install occurs when you are installing
Linux for the first time on the machine, or are replacing the
current version of Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux installation methods and installation types
The text-based installation method
The text-based installation method used in previous versions
of Linux may still be selected. Simply type text at the
boot: prompt and press Enter. For purposes of this course,
we concentrate on the GUI Red Hat® install.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux installation methods and installation types
Installation types (MouseOver transcript)
Worstation
installations:
Server:
Custom:
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are three terms; their corresponding definitions are listed in the right column.
Click once on a term in the left column, then click once on the definition in the right column to make a
match.
When you think you have all of the terms and their definitions matched correctly, click the Done button
and you'll see whether or not you've matched the terms correctly--green lines mean the match is correct,
red lines mean the match is incorrect. If you didn't get the matches right the first time, click Clear to erase
your matches and try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Partitioning strategy
Plan your partition layout and strategy.
Considering
backup
System administrators typically like to use a number of
strategy partitions rather than a single large partition. The rationale is
that a problem with one partition resulting in data loss will
not affect other partitions. In addition, many backup
strategies are based on backing up an entire filesystem
(partition). Having multiple partitions provides more
flexibility for creating an effective backup strategy.
With the exception of /boot, the root, /tmp, swap, /home, /usr
and /var partitions can always be larger than recommended. The
/boot partition should stay about 16MB.
Do not use /boot for everyday tasks. This is where your kernel is
located! If you did a lot of work in /boot, it would be too easy to
damage your startup or to lose your kernel.
Linux Native When you create partitions, you need to indicate what type of
and Linux filesystem they will contain. You assign two different
Swap filesystem types to Linux partitions. Your swap partition has
the type Linux Swap. Any partition that is not the swap
partition is created by default as the type Linux Native.
Letting Linux When you do a Workstation or Server installation, you can
partition for let Linux partition the drive for you. There are default sets of
you partitions created for both install classes so you don't have to
worry about the details. Use these schemes if you are
experimenting with the installation class, or if you are setting
up a simple end-user workstation. A workstation typically
does not need a fancy partitioning setup.
Next lesson In the next lesson, you'll learn about partitioning your hard
drive.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Partitioning the hard drive
Describe how the Disk Druid and fdisk partitioning
tools are used
Partitioning to
improve data
A hard drive is designed to store large amounts of data.
integrity Rather than place it all in one section of the drive, the drive's
storage area can be divided into separate partitions.
Partitioning improves data integrity, allows for a more
flexible backup strategy, and is something that Linux can
handle for you. This lesson is intended as a brief overview.
As you learn more about Linux, you'll learn more about
partitions and filesystem types. Later on in this module, you
will be able to apply what you have learned about partitions
in a simulated installation
Extended If you have a PC and you don't have SCSI hard drives, then
partitions you have an Integrated Drive Electronics (IDE) hard drive.
Up to four primary partitions can be defined for each IDE
hard drive. One primary partition can be further divided into
a number of extended partitions. Therefore, on one hard
drive it is possible (but not recommended) to have up to 16
total partitions (3 primary partitions, an extended primary
partition, and 12 logical partitions within that extended
partition).
Using Disk Disk Druid is available only during installations, and
Druid vs. fdisk provides an intuitive interface that will satisfy the
requirements of most users. The fdisk utility is also used
for partitioning. It is less intuitive but has some advanced
features that are not present with Disk Druid, such as the
ability to select the primary partition on which to place
extended partitions. However, for most user installations, it is
recommended that Disk Druid is used to create partitions.
Partitioning To create a partition using Disk Druid, first choose the file
using Disk system type (Linux Native or Linux Swap), then identify the
Druid mount point (if it is not a swap partition), and select the
partition's size, and then proceed to the next partition.
Let's look at each of these stages in more detail. Click on the
Transcript
View Flipbook button to see each partitioning screen.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Partitioning strategy
Planning partition size (Mouseover
transcript)
1.
2.
3.
4.
5.
6.
7.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Planning swap space
List the considerations in planning swap space.
About swap
space
Swap space is the hard drive version of your computer's
memory (RAM). It is possible to run programs that require
more memory than the RAM you have in your machine.
When this happens, the data that normally would go to your
RAM goes to files in the swap partition.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Partitioning the hard drive
Linux Native and Linux Swap
filesystems
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Partitioning the hard drive
Partitioning screen (Flipbook transcript)
Click the following thumbnails to view the full-sized image.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Installation demonstration
List the steps required in installing a Linux GNOME
workstation.
Transcript
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Language, keyboard, and mouse
selection
Select the default installation and system language,
keyboard, and mouse configuration.
Testing your Click the View Image to see the keyboard configuration
keyboard screen. Select a model that is appropriate for your system.
configuration Select the keyboard layout you want, and select whether or
not you want dead keys enabled. Use the text field at the
bottom of the screen to test your configuration.
If you cannot find an exact match, choose the best Generic match
for your keyboard type (for example, Generic 101-key PC).
Selecting a Click the View Image to see the mouse configuration screen.
Mouse type You will need to choose the correct mouse type for your
system. To do this, select from the list of possibilities in the
installation screen. Often you will find an exact match for
your mouse. If you cannot find your particular mouse on the
list, select one of the Generic entries, or choose one with
which your mouse is compatible.
Serial mouse If the mouse connector at the end of the mouse cable plugs
or a PS/2? into a rectangular connector, you have a serial mouse; if the
connector is round, you have a PS/2 mouse. If you are
installing Linux on a laptop computer, in most cases the
pointing device will be PS/2 compatible.
We'll continue our installation by continuing with keyboard,
language, and mouse configuration, in the simulation below.
Transcript
Next lesson Time zones must also be configured in the install. You will
also need to consider other network-related issues, including
how you get your IP address information. Let's take a look.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Installation demonstration
How to make your Linux installation
easier
Remember, the key to a successful installation is planning.
Here are several considerations and quick tips that may make
your Linux installation easier:
1. Check all of your hardware against the Hardware
Compatibility List. This issue cannot be stressed
enough.
2. Give some serious thought to how you plan to use this
system. If you plan to experiment, you may need more
hard drive space and packages than you might
otherwise.
3. Ask your Linux-savvy friends for advice and to
perhaps lend a hand while you do the install.
4. Know that this is a vocal community, and all Linux
users seem to have an opinion; take advantage of this
peer resource, but bear in mind that some users are
more realistic than others.
5. Build a list of online and offline resources in which
you find useful information. This list may become
invaluable later.
6. If possible, have a separate machine connected to the
Internet that you can use to research any problems that
might arise.
For a printable version of the above list, click the Easy Reference
folder icon.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Installation demonstration
Installing a Linux GNOME Workstation
(Simulation transcript)
1. This is the first screen you see when you prepare to
install Linux. Press Enter to start the installation in
graphical (GUI) mode.
2. English has been selected as the default language to
use during installation. Click "Next" to continue. This
completes the simulation.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Network setup and the Time Zone
selection screen
Configure the network setup, and select a time
zone.
Transcript
Next lesson The Account Configuration and X Configuration screens are
important because these are two parts of a Linux system that
most users encounter on a regular basis. In the next lesson,
you'll learn how to use the account configuration screen.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Language, keyboard, and mouse selection
About dead keys
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Language, keyboard, and mouse selection
Configuring the keyboard, language
and mouse (Simulation transcript)
1. As in the previous simulation, English is the default
language; you do not need to do anything to configure
the language unless you wish to use something other
than English. Click Next to continue.
2. Often, you can use the default Keyboard setting. As
before, the Online Help panel is on the left. Click Next
to continue.
3. Your mouse has three buttons and a square plug. Click
the three-button serial mouse option to continue.
4. Now click Next.
5. You have now reached the Red Hat® Welcome
screen. Click Next to proceed.
6. Note that the GNOME Workstation install type is
selected by default. Click Next to continue.
7. The Remove data option is selected by default. Click
Next to continue.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Account configuration and X
configuration
Describe how to use the Account Configuration
screen.
Steps in You start with the monitor, then continue with video card
configuring X configuration.
1. Monitor configuration: In configuring the monitor,
you tell the installer which brand and model of
monitor you are using. Choose the appropriate generic
option if your specific hardware is not listed.
2. Video card configuration: Next, you will configure
the video card. Once again, if your specific brand and
model are not included, choose generic. Be sure to
have documentation that came with the card handy: if
you use the generic option, you will need to tell the
installer what the limitations of the card are.
Continue with the installation simulation below to configure
X, the monitor, and video card.
Transcript
Account Now that you have configured X, you can move on to your
configuration account configuration.
When you set up an account, you are required to enter and
confirm a root password. Root is the account that the system
administrator uses. Optionally, you can create user accounts
from the Account Configuration screen as well.
The root user has unlimited access to the entire system; for this
reason, use the root account only when you need to perform
system maintenance or administration tasks.
The Account The steps for navigating the Account Configuration screen
Configuration are shown in the image below.
screen
When selecting a root password, it is recommended that you use
an alpha-numeric (letters and numbers) password, and that you
include one or more special characters (!@#$%^&*). Often it is
helpful to use an acronym to remember the root password.
Next lesson Sometimes you may run into uncertainties about your
hardware or have some other reason to abort an installation.
You'll learn about aborting an installation in the next lesson.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Network setup and the Time Zone Selection screen
Configuring the time zone and network
settings (Simulation transcript)
1. Screenshot shows the Network Configuration screen.
Student clicks on the Activate on boot button to trigger
the next screen
2. Click the Next button to proceed to the Time Zone
configuration screen.
3. To configure your time zone, click on the dot closest
to your own location. In this case, you are in Nome,
Alaska. Click that dot to proceed.
4. You now have your location selected. Click Next to
proceed to the Account Configuration screen.
5. You are at the Account Configuration screen. The
simulation stops here for now.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Final preparation for install and
aborting the installation
Abort an installation.
Aborting the
installation
Even with careful planning, there may be times when you
are about to commit to an install and realize that you forgot
something vital.
For example, while doing a Server installation, you decide to
allow the installer to write over your old Windows data.
However, just as you are about to write over your data, you
realize that you need to rescue a file. Or perhaps you had
trouble researching your hardware and need to do further
investigation before you fully trust your installation choices.
If you do not carefully follow these steps, you will directly boot
back into the installer.
You abort an installation from the About to Install screen.
Click the View Image button to see this screen.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice installing Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Account configuration and X configuration
X configuration of monitor and video
card (Simulation transcript)
1. When you set up the GUI or display settings, you must
first configure the monitor. For purposes of this
simulation, you are using a MAG Innovision™ brand
monitor. Click the + next to MAG to proceed.
2. You are using a MAG Innovision AX15FG monitor.
Find your monitor within the brand, and select it.
3. Click Next to continue.
4. The horizontal and vertical sync values for this
monitor are now displayed. Click Next to continue.
5. Now you will need to configure your video card. You
are using a simple 3DLabs Oxygen GMX™ video
card. Click that card to select it from the list.
6. You have 1MB of VRAM (video RAM) on your video
card. Click the 1024K radio button to continue.
7. Now, test the configuration to make sure you have it
right. Click the Test this configuration button to
continue.
8. The message "Can you see this message?" is now
displayed on the screen. This means that the test
worked. Click Yes to continue.
9. The installer returns you to the X Configuration
screen. Click Exit to end the simulation.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
Coming up In the next module, we'll discuss getting started with Linux
Exercise
Before moving on to the next module, click the Exercise
button to complete a GNOME Workstation installation.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Getting started with Red Hat® Linux
Module introduction
Linux is a robust operating system (OS) that runs on
IBM-compatible personal computers. Businesses,
individuals, and educational institutions are using Linux in a
variety of applications such as workstations, Web servers,
and file servers. Linux was originated by Linus Torvalds, but
has involved the collaboration of many developers all over
the world who use the Internet to communicate and distribute
changes. The background of Linux lies in the
hacker-programming culture of universities and the Internet,
but is now entering into the realm of the home PC user. This
is due to the growing acceptance of alternatives to Microsoft
operating systems, and the development of user-friendly
interfaces to Linux system administration.
By the end of this module, you will know how to:
● Define the features of Red Hat® Linux
Next lesson The next lesson will define the features of Red Hat Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Module wrap-up
GNOME Workstation installation
Objective
Configure X settings.
Scoring
You will receive 5 points for this exercise. When you have completed the simulation, and answered the
questions that follow, click the OK, I'm Done button to submit your answer to a tutor.
Background
You are in the middle of a GNOME Workstation installation and need to configure the X Window
System.
Instructions
You'll need to figure out a few steps on your own. We'll tell you what to do, but figuring out how to do it
will be your task in this exercise. Complete the simulation below, then answer the two questions that
follow.
If you get stuck, feel free to email the course tutors by clicking the Tutor button in the toolbar.
Hints
Observe how the values change as you move through each step of the configuration process.
Submitting your exercise
Answer each of the questions listed, then Click the OK, I'm Done button to view the results.
1. Which device, if it is not properly configured, could be permanently damaged?
2. Which video-related setting(s) can have multiple associated values?
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Red Hat® and the Linux operating
system
Define the features of Red Hat® Linux.
The Linux
operating
Linux is a UNIX-like operating system that incorporates the
system best features of its commercially available counterparts with
an added benefit to its users: it is free. The core component
of the Linux operating system is the kernel, which controls
hardware devices, system processes, and user access. All
other programs and utilities are separate pieces. Linux is a
multitasking environment, which means it can do more than
one thing at the same time; it's also a multi-user system,
allowing access from more than one user. All applications
and utilities running on the system are referred to as
processes. Linux uses a hierarchical file system structure that
can be thought of as a tree.
Discussion
At this point, please consider going to the Discussion area to
post your background, your current role, and your goals and
expectations for this course. We all have our reasons for
choosing Linux, and we would like to hear what prompted
you to make this decision.
Next lesson In the next lesson, you will learn about user accounts, group
accounts, and superuser accounts.
Quiz
Before moving on to the next lesson, click the Quiz button to
test your understanding of the history of Red Hat and Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Getting started with Red Hat® Linux
Other options for running Linux
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Users, groups, and superusers
Define user accounts, group accounts, and
superuser accounts.
More than one person can access the same Linux system
concurrently. All users have their own account on the
system, which the system administrator creates for them.
Users are categorized into three levels of accounts.
Levels of The highest level user is the superuser account, also known
users as the root account. The root account is used for system
administration tasks such as installing system utilities, or
even creating new user accounts. Because this account is so
powerful, there are security issues associated with its use. It
is recommended that users only log in as root users when
absolutely necessary for making system modifications, and
use their normal Linux user accounts for all other tasks.
All user accounts have a user ID number (UID) associated
with it that is unique. The first account added to a Red Hat®
Linux system will have UID 500. Users are also assigned a
primary group ID number (GID), which matches the UID.
Groups are provided for the purpose of collecting multiple
user accounts into functional units. For example, a database
group could contain all database administrators on a
particular system.
A user account and its password positively identify a user to
the system. This, combined with the UID and GID, provides
an effective level of security within the Linux system. The
ability to grant or deny permission based on a user or group
level is one of the most useful features of UNIX-like
operating systems.
Next lesson In the next lesson, you will learn how to log on to and off of
your Linux account.
Exercise
Before moving to the next lesson, click the Exercise button
to review the definitions of user accounts, group accounts,
and superuser accounts.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Red Hat and the Linux operating system
The connection between Linux and
UNIX operating systems
There are many different "flavors" of the UNIX operating
system, all descended from the original Bell Labs operating
system of the 1960s. The UNIX family tree split in the
1980s, and the two resulting branches became BSD and
SVR4. Linux is similar to each of these flavors of UNIX, and
has continued to evolve into an even more robust system.
The Linux kernel and many other components adhere to the
GNU General Public License (GPL), which dictates that it
can be both sold or given away, but must always be
accompanied by the source code and the GPL.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
2. Who began development of the Linux kernel and continues to maintain it?
Please select the best answer.
A. Richard Stallman
B. Bill Gates
C. Linus Torvalds
D. Red Hat
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Logging on to a Linux account
Log on to and off of your Linux account.
Logging on to
a Linux
So now we've installed our system and understand how user
account accounts are created and used. It's time we log on to our
Linux system for the first time. To begin, Linux presents you
with a login: prompt, which you will respond to using
your username (for practice, we'll say your username is
redhat). At this point, the system will request a password for
the user redhat, so you'll enter the supplied password (also
redhat). After checking to see whether this is correct, the
system will allow you access. It will then start up a shell
process (you'll learn more about this in a moment), which
places you in your home directory.
Next lesson In the next lesson, you will learn how to use the GUI
interface and open a terminal window.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Users, groups, and superusers
Users, Groups, and Superusers
(FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are five terms; their corresponding definitions are listed in the right column.
Click once on a term in the left column, then click once on the definition in the right column to make a
match.
When you think you have all of the terms and their definitions matched correctly, click the Done button
and you'll see whether or not you've matched the terms correctly--green lines mean the match is correct,
red lines mean the match is incorrect. If you didn't get the matches right the first time, click Clear to erase
your matches and try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Working with the GUI interface and
opening a terminal window
Describe how to use the GUI interface and open a
terminal window.
The GUI
interface
A graphical user interface (or GUI) called the X Window
System is distributed with Red Hat® Linux. Although you
can use Linux without it (in a non-graphical environment),
many users find it more comfortable to work in an X
Window environment, where buttons and programs are used
as opposed to typing out long commands on the command
line. The X Window System is also known as X11 and this is
often followed by whatever the current version is. For
instance, if it were version 6, you would see this abbreviated
as X11R6.
Next lesson In the next lesson, you will learn how and why to change
your password.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Changing your password
Change a password and discuss the importance of
doing so.
The password for your user account is the most basic but
important form of security. The easiest way for unauthorized
access to occur is from compromised user passwords. To
prevent this, there are guidelines for selecting powerful
passwords. Protecting yourself does not stop at password
selection, however. You should change your password on a
regular basis. A common schedule for password changes is
every six months, but more frequent password changes are
acceptable.
Passwords should be changed after the first login by
following these steps:
● From a terminal, enter the command: passwd
Next lesson In the next lesson, you will learn how to get online help with
the man page utility.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete a lab on how to log on to the system.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Working with the GUI interface and opening a terminal
window
Window manager choices
Common window managers are Sawfish, Afterstep and
FVWM2, all of which are included in Red Hat®
distributions. The GNOME desktop environment is a popular
addition to the window manager that allows further
customization of the GUI and specialization of the look and
feel. By default, you will see the GNOME panel at the
bottom of your screen, as well as the GNOME Help Browser
when you start X Windows.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Working with the GUI interface and opening a terminal
window
Options for closing a window
The best way to close a window is by exiting from within the
specific application. There are occasions, however, when the
application may be in an unstable state and unresponsive to
user input. At these times, you can override the application
by using the Close button that the window manager provides.
A third option is to annihilate the window, which kills the
application and the window immediately, but this should be
reserved for extreme circumstances when all else fails.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Working with the GUI interface and opening a terminal window
Working with a window (MouseOver
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Getting online help with the man page
utility
Use the man page utility.
man page_name
1 User commands
2 System calls
3 Subroutines
4 Devices
5 File formats
6 Games
7 Miscellaneous
8 System administration
n New
Next lesson In the next lesson, you will learn about the GNOME desktop
environment.
Exercise
Before moving to the next lesson, click the Exercise button
to practice getting online help.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Step 1: You will be prompted with a login: prompt. Enter your username, then you'll be prompted
with a password: prompt. Enter your password here. You should now see the shell prompt like this:
[root@localhost /root]#
Step 2: Type passwd to change your password. You will receive the following prompt:
Step 3: Here you should enter a new password of eight characters or more, containing at least one
uppercase character and one numeric character. For example, "Temp1234" would satisfy these
requirements. You'll then see this prompt:
If you have problems or questions about this lab, please contact a tutor with your concerns.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The GNOME desktop environment
Use and customize the GNOME environment.
The GNOME
help browser
The GNOME help browser is an interface which allows you
to easily access man, info and the GNOME User's Guide.
The GNOME User's Guide documents are specific to
operations you may need to do when using the GNOME
desktop environment. You may also view GNOME
documentation pages that are separate from the User's Guide.
The GNOME User's Guide is launched from the panel, but is
also started by default when you install the Red Hat® Linux
system. The interface is quite intuitive to use, but there are a
few commands that don't appear in the man and info sections
that you might like to see, since they exist in the online
manual. In these cases you should be able to get what you
need by using the man and info commands in a terminal
window.
Transcript
Next lesson In the next lesson, you will learn how to create a text file and
log off the system.
Quiz
Before moving to the next lesson, click the Quiz button to
review the features of the GNOME desktop environment.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Step 1: You will be prompted with a login: prompt. Enter your username, then you'll be prompted
with a password: prompt. Enter your password here. You should now see the shell prompt like this:
username@redhat $
Step 2: Use man to view all five commands listed above: man, ls, cd, pwd, and chmod
Example:
username@redhat $ man ls
This will format the output according to the size of your telnet window. You should see the command
listed at the top of the page, followed by the name, synopsis, description, and so on. If you don't see this,
send a note to the tutor.
Step 3: Now you will output the commands you ran in Step 2 to a text file for grading. At the shell
prompt, type the same command, man ls, but we'll follow it with the redirect operator (>) and an
output file name (the redirect operator (>) forces the output of the command to go to the filename
specified, rather than the screen). You should name your files with the command you are looking up,
followed by .out. This example shows the output being redirected to a file called man.out.
If you have problems or questions about this exercise, please contact a tutor with your concerns.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Editing text files and logging off
Create a text file and log off the system.
Editing text gEdit is a full featured, menu driven, easy-to-use text editor.
files using With gEdit you can create new files, edit existing text files,
gEdit and even work with specially formatted text files like email.
The gEdit editor is considered part of the GNOME desktop
environment; you can tell by looking at the first letter of the
application command. All applications developed specially
for the GNOME project effort have the letter G at the
beginning of the name, to identify them as different from any
generic program that may already exist in the X Window
System.
You can launch this application from the panel:
Main Menu (footprint)/Applications/gEdit
gedit [filename]
Once the file you are editing is open, you use gEdit with your
mouse by selecting areas or menus. You can type any text,
use common editing actions like cut, copy, and paste, search
the file for a certain text string, or print your file. There are
buttons to complete the actions listed above, but you can also
use the Edit menu, or the common keystroke shortcuts, such
as Control-V for paste.
The following simulation allows you to practice editing a
text file:
Transcript
Logging off Now that you are at the end of your session, you need to log
off properly. If you are working in a non-GUI session, you
need only type the exit command. This will bring you
back to a login prompt if at the Linux console; if you are
using telnet, you'll be disconnected from the host system.
From the X Window System(GNOME), click on the Main
Menu and choose Log Out, or right click on the Panel and
select Log Out.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice logging off of the Linux system.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The GNOME desktop environment
Using the GNOME desktop (Simulation
transcript)
1. Look up the ls command in the GNOME Help browser
man pages.
2. ls is in the User Commands section of the manual.
3. View the man page for ls.
4. Now go to the Main Menu to add the gEdit
application.
5. From the Main Menu go to the Panel sub-menu.
6. Add a new launcher icon to the Panel.
7. Add gEdit with the path /usr/sbin/gedit. We've already
chosen the icon for you. Select OK when finished.
8. After the gEdit icon has been added, we'll remove the
Netscape icon from the Panel. This is done by clicking
on the Netscape icon with the right mouse button.
9. Select the appropriate action in the applet menu to
remove the Netscape applet.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
1. What are the four informational sections you can view directly from the
GNOME Help Browser window?
Please select all the correct answers.
A. The GNOME User's Guide
B. The GNU General Public License
C. GNOME documentation pages
D. UNIX history
E. Man pages
F. Info pages
3. There are two buttons that allow you to hide the GNOME Panel. Where are
they located?
Please select the best answer.
A. In the GNOME Help Browser
B. In the Applications submenu
C. At the extreme left and right sides of the GNOME Panel itself
D. In the Main Menu
4. When you convert the Panel to a corner Panel, what are you primarily doing?
Please select the best answer.
A. Removing the Netscape icon
B. Shrinking the Panel to it smallest size while still allowing all
icons to be viewable
C. Hiding the Panel
D. Adding an extra Panel for our extra applets which do not fit on
the standard Panel
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
New terms Here is a list of terms used in this module that may have been
new to you:
● Kernel
● Shell
● source code
● GUI
● Nongraphical Text-based interface
● Info
● Main Menu
● Text editor
Coming up In the next module, you'll learn about the Linux filesystem.
Quiz
Before moving on to the next module, click the Quiz button
to review some of the activities you have learned in this
introductory module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Editing text files and logging off
Editing text files (Simulation transcript)
1. First we launch gEdit from the command line by
typing in the full path to gEdit, which is:
/usr/bin/gedit.
2. The above screen will appear. Enter the text "The
quick brown fox jumped over the lazy dog." into the
gEdit window.
3. Click the "Save" button above the text area.
4. Since this is a new file that has never been saved
before, the system wants to know what to save it as.
The Save As window opens up for you. Type the
filename: file1.txt into the empty field at the bottom of
the window. Then click OK.
5. We now see our sentence again. To cut and paste
within our document, we must first decide what we
wish to cut, such as the words "jumped over." We
would need to highlight these words with our cursor
(we have done this for you) then click on the Edit
button above to get the Edit menu.
6. Select Cut from this menu.
7. We can see that the phrase we selected has been cut
from the sentence. Now we must decide where we
want to paste the cut phrase. Put your cursor two lines
beneath the word "the" and click on the Edit button to
get the Edit menu again.
8. Now from the Edit menu select Paste.
Step 1: You will be prompted with a login: prompt. Enter your username, then you'll be prompted
with a password: prompt. Enter your password here. You should now see the shell prompt which
looks something like this:
username@redhat $
Step 2: Type the who command. You will see all the other users on the Linux system at the same time
you are. Here you can see the advantage of the Linux multi-user environment; it allows many people to
access the system at the same time while not affecting each other.
Step 3: Now type the whoami command. This is a command to show what user ID you have used to log
in. This command is useful if you log in using more than one user ID, and forget what screen you are
working with.
Step 4: Now enter the date command. It may be somewhat obvious what this command does, but this
command probably gives you more information than you expected.
Step 5: You are going to log out. Simply type exit at your shell prompt, and you will be disconnected
from the lab system.
If you have problems or questions about this lab, please contact a tutor with your concerns.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Understanding the Linux Filesystem
Module introduction
If you're using a computer, you're interacting with the
filesystem in some way. A filesystem describes how your
hard drive is set up to manage and access the data on your
operating system.
The Linux filesystem is somewhat different from other
operating systems you may have worked with. If you were
using the Microsoft operating system before Windows 95,
you're already familiar with the MS-DOS filesystem.
● List the different file types and determine the file type
from the command line
● Identify file type in GMC
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introducing the Linux filesystem
Describe the filesystem hierarchy.
The usr The usr directory is the base point for another hierarchy that
directory contains items that can be shared among multiple Linux
machines. Each of the directories in the usr directory is
explained in more detail in the table below.
Directory Description
Contains the programs that users often need but are not
bin
necessary for the system to function
Join the In what ways is the Linux filesystem structure different from
discussion on other filesystems you might be familiar with?
the Linux
filesystem
Discussion
Click the Discuss button on the toolbar to discuss this, or
related, topics.
Next lesson In the next lesson, you will learn about the structure of the
Linux directory system.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete an exercise on the Linux filesystem.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Understanding the Linux Filesystem
Today's Windows filesystem
Today, Windows uses either VFAT or VFAT32, the most
obvious difference at the user level being that you are no
longer limited to short file names with eight characters,
followed by a dot, and then three characters.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Typical Linux directory structure and
Linux system directories
Describe the Linux directory system.
Files and
directories
Linux sees everything as a file. This fact can get really
confusing as you get into more advanced topics. The most
important things to remember are:
● Every file in Linux is stored on the system with a
unique name. This name consists of both the file name
itself, and the entire series of directories leading to that
file.
● All files are stored in directories that can also hold
other files or directories.
The directory Directories in Linux are a special type of file that can contain
structure other files. Their function is similar to folders in a file
cabinet. They are used to organize and group related files
together in Linux, just as they are in other operating systems
such as MS-DOS, Windows, and MacOS.
As we saw in an earlier lesson, the complete filesystem has a
tree-like structure in which directories "branch off." You
represent a branch in this tree with a series of slashes
between each of the directories.
For example, if you have the file mytext in your redhat
home directory, then the path through the tree to the file is
/home/redhat/mytext. Why? The reasons are as
follows:
1. Everything starts in the root directory, or /
2. All user home directories are in the directory home
3. Your redhat home directory is in a directory named
redhat inside the directory home
You can have other files named mytext only if they are not
inside /home/redhat.
Next lesson In the next lesson, you'll learn about the /home branch of
your directory tree.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introducing the Linux filesystem
Linux filesystem hierarchy (Mouseover
transcript)
/
bin
boot
dev
etc
home
lib
mnt
opt
proc
root
sbin
tmp
usr
var
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are five top level directories; functions associated with each are listed in the
right column. Click once on a term in the left column, then click once on the definition in the right
column to make a match.
When you think you have all of the terms and their definitions matched correctly, click the Done button
and you'll see whether or not you've matched the terms correctly--green lines mean the match is correct,
red lines mean the match is incorrect. If you didn't get the matches right the first time, click Clear to erase
your matches and try again.
Hints
Often the directory name itself contains a clue about its contents.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
User directories and the home directory
Describe the purpose of the various user
directories and the home directory.
The system is not the only entity that needs to have private
space for its files. It is important that there is space set aside
for users also. Not only do users need somewhere private to
store their files, they also affect the filesystem in other ways
through programs creating temporary files, and more. By
separating user data and programs into their own trees in the
filesystem, you avoid mixing user and system files together.
Next lesson In the next lesson, you will learn how to manipulate
directories and files.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The GNOME file manager
Explain the role of the GNOME file manager.
Click the FlipBook button to the left and see these steps in
Transcript
more detail.
Choosing file GNU Midnight Commander offers four different ways that
view details you can view files and directories in a listing. They are Icons,
Brief, Detailed and Custom. These options are available by
clicking one of the four buttons in the top right portion of the
GMC window. Click the Image button to the left to view
these options.
View Result
Icons
Brief
Detailed
Custom
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using GNU Midnight Commander
Describe the features and functionality of the GNU
Midnight Commander.
Next lesson The next lesson discusses how to use the GNU Midnight
Commander to sort files.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The GNOME file manager
Opening GMC (FlipBook transcript)
Click the following thumbnails to view the full-sized image.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using GMC to sort files
Use GMC to sort files.
Transcript
Next lesson In the next lesson, you'll learn about the Linux directory
system.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete an On Your Own exercise.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using GNU Midnight Commander
A tour of GNU Midnight Commander
features (MouseOver transcript)
1.
2.
3.
4.
5.
6.
7.
8.
9.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Moving through the filesystem
Navigate the Linux filesystem using relative and
absolute paths.
Navigate the
Linux
Navigating the Linux filesystem is an important skill to
filesystem learn. You may already know how to do this graphically, but
you will not always have this option; in fact, you may find
that you prefer to work directly at the command line when
you do not need a specific GUI feature.
There are a few important points to note when working with
Linux:
1. Linux is case-sensitive. For example, the filename
Linus_Torvalds is not the same as linus_torvalds.
cd /
Moving to the As you will remember from the earlier discussion on the
parent filesystem hierarchy, the parent directory refers to the
directory on directory immediately "above" the one in question. When
the command you move to the parent directory, you are essentially moving
line up one level in the directory tree.
cd ..
cd ../../..
Relative and There are two ways to move from one directory to another on
absolute paths the command line. One way is to use a relative path, and the
on the other is to use the absolute path.
command line
Think of relative and absolute paths as being two ways to
reach the same destination. The relative path will be relative
to where you are coming from. The absolute path will be the
global starting point for anyone, regardless of where they are
coming from.
Let's look at how absolute and relative paths pertain to
filesystem navigation. As we mentioned above, there are two
ways to move from one directory to another on the command
line. In both of the following examples, you are already in
the /home directory. Both examples take you to the same
end place.
1. Use the full (absolute) path that lists the complete path
to the directory you want to go to from the root
directory:
cd /home/redhat
2. Use a relative pathname (that refers to only the parts of
the path you want to go to compared to where you are
now), such as typing from inside /home:
cd redhat
Transcript
Next lesson The ls and pwd commands are two of the most useful in
Linux. These commands are discussed in the next lesson.
Exercise
Before moving to the next lesson, click the Exercise button
to complete a lab on how to change directories on the
command line.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using GMC to sort files
Use GMC to display and sort files
(Simulation transcript)
1. Click the Detailed button to change to Detailed view.
2. Click the Name header bar to sort by file name from
lowest to highest.
3. Click on the Size header bar to sort by file size from
largest to smallest.
4. Click on Size again to reverse the sort.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Investigating the Red Hat® Linux
filesystem using ls and pwd
Demonstrate the use of the ls and pwd commands.
Using the pwd It is often useful to be able to find out where you are in the
command system. One way to do this is to use the pwd or print
working directory command.
The pwd command prints the pathname of the current or
working directory.
Listing files You can use ls with various options. For example, to print a
using ls list of files for the /etc directory, simply use ls /etc
without options.
The syntax is as follows: ls
To print a long listing for files for the working directory, use
the -l option.
The syntax is as follows: ls -l
A long listing A simple listing (ls) simply contains file and directory
names, none of which begin with a period. A long format
listing (ls -l) contains file/directory names and other
information such as when the file was last changed, its size,
its permissions and ownerships. Once again, filenames that
begin with a period are excluded.
Listing files As shown in the View Image to your left, the Contents
using GMC window of GMC shows the files in the currently selected
directory. To see the contents of another directory, select it in
the left-hand side tree view. Contents for that directory will
be displayed in the right-hand side contents view.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Moving through the filesystem
Changing directories (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
You are currently in the /home directory. Using the directory diagram, do the following:
1. You need to access something in the files directory. Go to the redhat directory using the
absolute method.
2. You are now in the redhat directory. Go to the files directory using the relative method.
3. You are done with the file in the files directory. Go to the main home directory using the
relative method.
4. You are now in the home directory. Go to your own home directory (/home/redhat) using the
"my home" shortcut.
5. You are now in the redhat directory. Go to the root directory using the absolute method.
Hints
Not all of these steps have to be completed by just typing one thing. You can use multiple commands if
you need to, but remember to separate multiple commands with a semi-colon.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exploring file types
List the different file types and determine the file
type from the command line.
Linux file There are a number of different file types. Each is used for a
types different purpose, which you will learn more about as you
continue to learn about the Linux filesystem.
● Ordinary files
● Directories
● Symbolic links
Determining You can get file type information at the command line using
the file type the file command. This command uses a series of tests and
from the then displays the type of file. You use this command with the
command line syntax:
file [filename...]
Linux file The output of the ls -l command on the command line
types can be used to determine file types. To use this long line of
data just to get the file type, look at the very first character in
the listing.
Directory d A directory
Valid Linux file Every operating system has its own idiosyncrasies to
names consider when naming files. There are a number of common
mistakes to avoid when assigning file names.
Next lesson If you're using the GUI Red Hat® interface, you need to be
able to determine file type in GMC. You'll learn how to do
this in the next lesson.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Determining the file type in GMC
Identify file type in GMC.
File type in The following table explains some of the more common cues
GMC to look for.
Directory Blue
Links Green
Socket = Black
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exploring file types
Common mistakes when naming files
There are a number of common mistakes new Linux users
make when naming their files. For one thing, try to avoid
putting spaces in a file name. You can actually access the file
later, but you will have to understand the proper techniques
for doing so. Remember that Linux is case-sensitive, so you
will have to type the file name later exactly as you enter it
initially (or change it later).
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
File and directory manipulation
Create files and directories on the command line.
Creating a You can create directories on the command line using the
directory mkdir command.
using mkdir
The syntax is as follows:
mkdir [dir]
or
mkdir [path/dir]
mkdir test
Creating You can also create files on the command line using several
empty files different commands. The touch command is one example.
using touch
The syntax is as follows:
touch [filename]
Often the file was changed the last time it was accessed, so
frequently these two values are identical.
ls -l yellow
If you were to now do a long listing for the file yellow, the
output for the current date and time would be as follows:
Removing Just as you can create directories, you can delete them.
directories
using rmdir The syntax is as follows:
rmdir [dirname]
rmdir test
To delete a directory without first removing the contents, use
rm with the -r option.
Deleting files Directories and files can be deleted in the GNU Midnight
in GMC Commander by doing the following:
1. Select the file or directory you want to delete in the
right-hand window pane
Transcript
Exercise
Before moving to the next lesson, click the Exercise button
to complete a lab exercise on exploring the directories on
your system.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
● List the different file types and determine the file type
from the command line
● Identify file type in GMC
● ASCII
Quiz
Before moving on to the next module, click the Quiz button
to complete a quiz on the material covered in this module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
File and directory manipulation
Creating files and directories (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using special characters
Module introduction
The shell is the command line interpreter that takes input
from the user and translates the command into kernel
instructions. This is useful, but there are some characters you
might type on the command line that have more than one
meaning. These are called special characters. Special
characters are used in a number of situations in the Linux
environment. They can be used on the command line, in
programming, and even in X Window systems.
Special characters can make your life easier by allowing you
to abbreviate long commands. When a special character
appears in a command, the system will interpret it as a
request to match certain things. For example, you may want
to find a number of files rather than just one. Rather than
retrieving each one separately, you can write your command
in such a way that all of the desired files will be retrieved at
once. This would be a rather long command if you wrote it
out the conventional way, but using a special character will
convey the same meaning in a shortened form. We will
discuss several examples of this below to make the concept
clear. The special characters we'll discuss will be the ones
used most often in the shell.
After completing the lessons and learning checks in this
module, you will understand how to:
● Identify the most common wildcard characters and
their meanings
● Explain the usefulness of the tilde and the dollar sign
as special characters
● Explain how special characters are used to help
increase productivity
● Explain how special characters are used with GMC
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
Linux filesystem
Each question is worth one point. Some questions ask you to select the best
answer, others ask you to select all the correct answers. To receive credit for
questions asking for all the correct answers, you must select all the correct
answers and only the correct answers.
1. You start in the directory /root and want to go to the directory /home/bob.
How might you get to this directory using the relative directories path?
Please select all the correct answers.
A. cd ../home/bob
B. cd /home/bob
C. cd ..; cd /home; cd bob
D. cd ~
2. What command would you use to find out where you are in the Linux directory
tree?
Please select the best answer.
A. ls
B. ls -la
C. cd
D. pwd
3. What ls flag or option do you need to be able to see files starting with a dot?
Please select the best answer.
A. -l
B. -a
C. -s
D. -d
4. Which of the following cd commands will get you to your home directory
(your username is fred) from the /home directory?
Please select all the correct answers.
A. cd /home/fred
B. cd ~
C. cd ../fred
D. cd fred
5. You type ls -l in /dev. What letter will be at the beginning of the listing
for your mouse's device driver?
Please select the best answer.
A. b
B. c
C. d
D. -
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Wildcard special characters
Identify the most common wildcard characters and
their meanings.
Wildcards
You may know of the term "wildcard" as it relates to
playing a card game; a wildcard is a card that can take the
place of many other cards. Similarly, in Linux, a wildcard is
a type of special character that can tell the system to find
many different things for you. There are three types of
wildcards:
1. The string wildcard
2. The single character wildcard
3. The range wildcard
The first example in the table uses the string wildcard to list
all the files that end in .txt. The second example uses the
single character wildcard ? to find only files that start with
file3, end with .txt, and contain any character in the
middle. The third example uses the range wildcard to find
files with file at the beginning followed by any lowercase
character (a-z), and .txt at the end.
Next lesson In the next lesson, you will learn about two other special
characters: the tilde and the dollar sign.
Exercise
Before moving on to the next lesson, click the Exercise
button to test your knowledge of special characters.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Other important special characters
Explain the usefulness of the tilde and the dollar
sign as special characters.
Other special
characters
All wildcards are special characters, but not all special
characters are wildcards. In addition to the wildcard special
characters we have discussed, two other very useful special
characters are the tilde ~ and the dollar sign $. The tilde
represents the user's home directory, (which is
/home/redhat in our lab environment). The dollar sign
is used for "variables" (identifiers that have a value
associated with them). When it appears in the shell it
indicates a "shell variable", which is basically a regular
variable that provides special information to the shell for the
purpose of customizing the environment. The tilde is often
used to abbreviate your command. For example, if you type:
redhat@localhost redhat]$ ls ~
Next lesson In the next lesson, you will learn how to use special
characters to increase productivity.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are three special character names with their corresponding symbols in the right
column. Click once on a name in the left column, then click once on the symbol in the right column to
make a match.
When you think you have all of the names and their symbols matched, click the Done button and you'll
see whether or not they matched up correctly--green lines mean the match is correct, red lines mean the
match is incorrect. If you didn't get the matches right the first time, click Clear to erase your matches and
try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Command line uses for the special
characters
Explain how special characters are used to help
increase productivity.
The reasons
for special
Special characters are used on the command line when
characters attempting to abbreviate a command or search for a string.
The shell reads your command line in chunks known as
words. When you hit the Enter (or Return) key, the shell will
take these words and examine them for any special
characters. If any special characters appear, they will be
replaced with the meaning they represent. Therefore, these
special characters act like red flags for the shell, indicating
when it should employ certain behavior.
Next lesson In the next lesson, you will learn how special characters are
used with GMC.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice using the special characters we have
discussed in this lesson.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using special characters with GMC
Explain how special characters are used with GMC.
When to use
special
The default file manager that comes with GNOME is the
characters called the GNU Midnight Commander (GMC). GMC is a
with GMC component of the GNOME desktop environment, which
presents your directory structure and files to you in a
graphical manner. The window is separated vertically, with a
tree showing all directories on the left side, and an area
showing all files on the right side. The file listing can be
viewed as icons, which helps users determine what file types
they are seeing--whether they are directories themselves,
binary files, or text files. GMC allows you to graphically
view the contents of directories and easily navigate around
the Linux filesystem. For example, you could quickly list all
the files which contain the dollar sign character $, and view
them by clicking the file name with the mouse.
You'll use special characters in the GMC environment almost
as frequently as in the command line interface. These will be
interpreted just as they would in the shell. The convenience
is that you'll be able to quickly identify file types due to the
distinct icons used in GMC.
Shell special characters can be used when working with
GMC. To enable this format use the following steps:
● Select Preferences from the Edit menu
Transcript
Next lesson In the next lesson, you will learn how the shell interprets
double quotes.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Command line uses for the special characters
Examples of two useful commands
The following examples demonstrate two commands that can
make a potentially time-consuming task very efficient. The
first command copies every file in one directory to another,
which would take much more time if you were to specify
each file individually.
file a* Determine the file types for all files in a directory that
begin with the letter "a"
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Step 1: You will be prompted with a login: prompt. Enter your username, then you'll be prompted
with a password: prompt. Enter your password here. You should now see the shell prompt like this:
[redhat@localhost redhat]$
Step 2: List the files in the /etc directory which begin with "host". To do this, use the command:
[redhat@localhost redhat]$ ls
/etc/host*
Step 3: List any files or directories in the /etc directory which only have three letters in their name and
begin with the letter "r", for example:
[redhat@localhost redhat]$ ls /etc/r??
Step 4: List all the files in the redhat user's home directory, using the tilde to indicate the username:
[redhat@localhost redhat]$ ls ~
If you have problems or questions about this lab, please contact a tutor with your concerns.
Submitting your exercise
Enter your answer into the text box below. Click the OK, I'm Done button to submit the code to a tutor.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using double quotes to prevent
interpretation of special characters
Explain how the shell interprets double quotes.
Transcript
Exercise
Before moving on to the next lesson, click the Exercise
button to practice using double quotes.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using special characters with GMC
Using special characters with GMC
(FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
New terms Here are some of the new terms you encountered in this
lesson.
● GMC
● Shell
● Special character
Coming up In the next module, you will learn about file manipulation
and location.
Exercise
Before moving on to the next lesson, click the Exercise
button to review the use of special characters.
Quiz
Before moving on to the next lesson, click the Quiz button to
review what you have learned in this lesson about special
characters.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using double quotes to prevent interpretation of special
characters
Double quotes and special characters
(FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
File manipulation and location
Module introduction
One of the things most people want or need to do under any
operating system is view and work with files. Linux has an
assortment of commands that allow you to do a wide variety
of things with your files (text files in particular). The GNU
Midnight Commander also offers a range of similar features.
By the end of this unit, you will be able to:
● Create and move files and directories using the cp and
mv commands
● Copy and remove files and directories using rmdir,
rm, and the GMC
● Use the less, more, cat, head, and tail
commands to view text file contents
● Use pipes and redirection to manipulate data's
destination
● Use the slocate, find, and which commands to
search the filesystem
Next lesson In an earlier lesson, you learned how to create and move files
and directories. Now, let's look at this skill in more detail.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Module wrap-up
Understanding special characters
Objective
Find and use the appropriate special character to solve a problem.
Scoring
This exercise is worth a total of 5 points. To receive full credit, you'll need to cut and paste your answer
into the text box and click the OK, I'm Done button in order to submit it to a tutor.
Background
Enter the course lab to do this exercise.
Instructions
Step 1: Log in to the system.
Step 2: Change into the /home/username/exercise1 directory.
Step 3: List all files that have seven-character file names.
Step 4: First produce a list of files which begin with the pattern file, then a listing of files which have a
tilde (~) at the end of the file name. You'll need to use all the commands you have learned to produce this
list.
Step 5: Submit this list to the tutor below. (You can cut and paste from your terminal window.)
Submitting your exercise
Enter your answer into the text box below. Click the OK, I'm Done button to submit your solution to a
tutor.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
Special characters
Each question is worth one point. Some questions ask you to select the best
answer, others ask you to select all the correct answers. To receive credit for
questions asking for all the correct answers, you must select all the correct
answers and only the correct answers.
1. Which of the following is a string wildcard special character?
Please select the best answer.
A. The dollar sign ($)
B. The tilde (~)
C. The ampersand (&)
D. The asterisk (*)
2. The expression file* will list files that contain what pattern?
Please select the best answer.
A. Any file beginning with the string file
B. Any file ending with an asterisk (*)
C. All files that end in .txt
D. Only the file named myfile.txt
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Creating and moving files and
directories
Create and move files and directories using mv,
touch, mkdir, and the GMC.
Creating files As you know from an earlier module, you can create new
using the files in Linux using several commands. As seen in the image
touch below, the touch command uses the syntax touch
command [file]. This command creates an empty file with the name
specified on the command line.
mv [original] [new]
Creating files As you know, you can also move and create files in GMC.
in GMC
To create a new file in the GMC:
1. Open the GMC.
2. Change to the directory you want to create the file in.
3. Click Commands, Run Command to open the Enter
Command to run dialog box.
4. Type touch [file] for the file you want to create
within the current directory.
You may need to click the Rescan button before this file shows up
properly in the listing.
Moving files in You have two options available when moving files in the
GMC GMC: drag-and-drop or menu. Which you choose is more
often than not the one you are most comfortable with.
To move a file using drag and drop:
1. Open the GMC.
2. Change to the directory containing the file you want to
move.
3. Click on the file and do not release the mouse button.
4. Drag the file onto the directory you want to move it
into. If this directory is hidden inside another
directory, then pause over the unexpanded directory
until it expands to show the subdirectories, and then
drag it onto the subdirectory.
Next lesson In the next lesson, you'll learn how to copy and delete files
on the command line.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice creating and moving files on the command
line.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Copying and removing files and
directories
Copy and remove files and directories using rmdir,
rm, and the GMC.
Copying files One of the most common file manipulation commands you'll
using cp use is the cp command.
The cp command is used to copy files or directories. For
example, if you wish to copy a file from your home directory
into a new subdirectory, the cp command would make a
copy of the source file in the specified directory.
If the source includes more than one file, the dest must
be a directory. For example, perhaps you have the directory
/home/redhat/files and want to subdivide it into
types of files. One of these might be
/home/redhat/files/text. To copy all the text files
(which you ended with the extension .txt) into this new
subdirectory, you might type the following from inside
/home/redhat/files.
cp *.txt text
Copying You may wish to copy a directory and its contents to another
directories location. Directories may be copied with an appropriate
using cp option. There are a few options you might find interesting.
They are listed in the following table.
Option Purpose
-f If a file with the name of the file you are copying already exists in
the location you are copying to, overwrite it automatically.
-i If a file with the name of the file you are copying already exists in
the location you are copying to, always ask whether to overwrite
or not.
-r Copy contents recursively, including subdirectories.
-u Check to see if a file with the same name already exists in the
destination point. If so, check to see if the existing file is older than
the one being copied. If it is older, replace it. If the file is not
already there, make the copy.
cp -r testdir newtest
You use this command to delete files. If you use the rm -r,
you can also delete directories.
The rm command has a built-in safeguard that prevents you
from deleting a file or directory that is not empty. When you
use the rm command to delete a file or directory that
contains data--for example, a file that has text in it instead of
an empty one created with the touch command--rm will
ask you whether you really want to delete the file (y/n).
rmdir [dirname]
Transcript
Now that you can create, move, copy, and remove files and
directories, you have all the basic file and directory
manipulation tools at your disposal!
Next lesson Being able to send the output of one command as the input to
another is extremely useful. You'll learn about file
redirection and pipes in the next lesson.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice copying and removing files and directories
on the command line.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Viewing text files using less, more, cat,
head, and tail
Use the less, more, cat, head, and tail commands to
view text file contents.
Viewing text The less, more, cat, head, and tail commands each
files using less provide a quick way to view the full contents of a text file.
and more
The syntax for using less and more is as follows.
less [file...]
more [file...]
The difference You will not notice many differences between these two
between less programs until you learn later how to search for text inside
and more them. The less command highlights the text it finds in a
search, which is very helpful! The less command is similar
to more, but is slightly more modern.
Viewing text The head and tail commands show data from either the
files using beginning or the end of a text file.
head and tail
The syntax for using head and tail is similar.
Option Description
-c Print amount of text corresponding to the given size. You have
three available sizes: b for bytes, k for KB, and m for MB. No
included size defaults to bytes.
-n Print amount of text corresponding to the given number of lines.
-q Do not print information about which file's lines are being
displayed.
-v Print information about which file's lines are being displayed.
Transcript
Next lesson In the next lesson, you will learn how to run searches
through your filesystem.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice using the commands you just learned to
view files.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Copying and removing files and directories
Copying and deleting files at the
command line and in GMC (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Hints
Not all of these steps have to be completed independently. You can use multiple commands if necessary
unless otherwise specified.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Manipulating process output
Use pipes and redirection to manipulate data's
destination.
Using pipes
and
There are a number of tools available in Linux that allow
redirection you to alter where data goes. These tools typically fall into
two types: redirection and pipes. As you get more involved
using Linux on a regular basis, you will need a solid
understanding of these tools.
Redirecting The term redirection in this context refers to taking data that
data was meant for one end destination and assigning it a new end
destination. Before you learn how redirection occurs, you
need to understand standard input, standard output, and
standard error. These are explained in the table below.
Using pipes to Pipes allow you to take the output of one command and send
connect it as the input for another, as represented by the image below.
processes
Next lesson In the next lesson, you will learn many ways to view file
contents.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete a matching exercise on file redirection
and using pipes to connect processes.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete a lab exercise on file redirection.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Viewing text files using less, more, cat, head, and tail
Viewing first and last lines of a file
using cat, head, and tail (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Viewing text files using less, more, cat, head, and tail
Lab: viewing text files using less, more and cat
Objective
View text files from the command line.
Scoring
This non-scored lab provides you an opportunity to practice what you learned in the previous lesson in
the actual Red Hat® Linux environment. You will be presented with a task, but will not submit your
response to a tutor. When you have completed the exercise, click the OK, I'm Done button to continue.
Background
Here is your chance to practice viewing text files using the less, more, and cat commands.
Instructions
Log into the lab, which starts you in your home directory (structured as shown in the following image).
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Use the slocate, find, and which
commands
Use the slocate, find, and which commands to search
the filesystem.
Using which to The which command searches through the directories in your
search for path statement for the pattern or string you designate. You use it
programs specifically to find programs you want to run. These programs
have to be within the set of directories that Linux looks in by
default whenever you try to run a program (the path statement).
which [pattern]
An example is as follows.
which httpd
/usr/sbin/httpd
To see what your path actually consists of, type echo $PATH.
Using slocate The slocate command operates differently from the which
to search your command in one important way. The which command only
filesystem searches the contents of your path. The slocate command
structure looks everywhere in your filesystem.
A "snapshot" of your filesystem is captured at 4am every
morning. Instead of searching on the live filesystem, slocate
searches the most recent "snapshot" version of the filesystem.
slocate [pattern]
For example, when searching for the string profile you would use
the following.
slocate profile
/etc/profile
/etc/profile.d
/etc/profile.d/colorls.csh
/etc/profile.d/colorls.sh
Using find to The find command searches through the live filesystem.
search your
filesystem The syntax for using find is listed below.
structure
Example:
In this case, the command line will find files that are named
"profile." For example, the following search might turn up.
/etc/profile
/usr/lib/tclX8.0.4/help/tcl/debug/profile
Unlike slocate, find looks for an exact match. A file called
Profile will not be found, but neither will a file called
profile.d.
Next lesson In the next lesson, you will learn how to search through text.
Exercise
Before moving on to the next lesson, click the Exercise button to
practice using the commands you just learned to find files.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Manipulating process output
Introduction to /dev/null
Although it does not actually exist, /dev/null
(pronounced "dev null") is a place that people sometimes
find useful to send data to. It's often referred to as the "bit
bucket" because it's like sending bits and bytes into the trash.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are five commands and their corresponding output in the right column. Click
once on a term in the left column, then click once on the definition in the right column to make a match.
When you think you have all the terms and their definitions matched correctly, click the Done button to
see whether or not you've matched the terms correctly--green lines mean the match is correct, red lines
mean the match is incorrect. If you didn't get the matches right the first time, click Clear to erase your
matches and try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
You are currently in the /home/redhat directory. Using the directory diagram, do the following:
1. Using a single command, redirect the output of the who command to the file
/home/redhat/testdir/who_output.
2. Verify that the action was successful by viewing the contents of
/home/redhat/testdir/who_output.
3. Using a single command, append the contents of a long format directory listing of
/home/redhat to the file /home/redhat/testdir/who_output.
4. Using a single command, send the output of the long format directory listing of /tmp through the
more program.
Hints
Not all of these steps have to be completed independently. You can use multiple commands if necessary.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using grep to find search strings
Describe how grep is used and use it to find a
search string.
In other words, you can search when the files are text files.
You cannot use grep on compiled programs because these
files are not text files.
Search for text The grep command searches for patterns within text. The
in files using syntax for using grep is listed below.
grep
As you can see from the two different syntaxes listed, you
can use grep to search through the contents of a text file, or
search through output piped from another command.
Options The grep command has a number of options available. The
available with ones you might find most useful are listed in the table below.
grep Click on the View Image button to see the first 5 pages of the
file used in this example, then review the examples included
in the table below. This file is included in your user
directory.
Output number of
grep -B 4 Aster lines of context
-B number
lwmen10.txt before the actual
match.
Output number of
grep -C 4 Aster lines of context
-C number around the actual
lwmen10.txt
match (above and
below).
Exercise
Before moving on to the next lesson, click the Exercise
button to complete an exercise using the commands you just
learned to find strings in files.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Hints
Not all of these steps have to be completed independently. You can use multiple commands if necessary.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
You now have many of the tools you need to round out your
abilities to work within the Linux filesystem. In fact, you
know enough to be able to explore your own machine
through a combination of searching and viewing file
contents. Take some time to become familiar with the tools
you now have at your disposal.
Now that you have completed this module, you are able to:
● Create and move files and directories using the cp and
mv commands
● Copy and remove files and directories using rmdir,
rm, and the GMC
● Use the less, more, cat, head, and tail
commands to view text file contents
● Use pipes and redirection to manipulate data's
destination
● Use the slocate, find, and which commands to
search the filesystem
New terms Here are some of the new terms you encountered in this
module.
● concatenate
● pipe
● redirection
● STDIN
● STDERR
● STDOUT
Coming up File access permissions are one of the most powerful features
of Linux. In the next module, we'll discuss file access
permissions.
Quiz
Before moving on to the next lesson, click the Quiz button to
review what you learned in this module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Hints
Not all of these steps have to be completed independently. You can use multiple commands if necessary.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
File access permissions
Module introduction
Linux is regarded as a very secure operating system because
it has the ability to allow or deny access to files and
application programs. This is important if the system has
many users working independently; if one of those users
attempts to delete system files either purposely or
accidentally, the action will be denied. The file access
permissions are what provide this valuable feature to Linux.
Permissions are one of the most fundamental concepts you
will learn, and having a solid understanding of how they
work will make you a better Linux user.
By the end of this lesson, you will have learned how to:
● Define file access permissions
Next lesson In the next lesson, you will learn about file access
permissions.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
Module review
Each question is worth one point. Some questions ask you to select the best
answer, others ask you to select all the correct answers. To receive credit for
questions asking for all the correct answers, you must select all the correct
answers and only the correct answers.
1. Which of the following commands allows you to rename a file?
Please select the best answer.
A. ls
B. rm
C. mv
D. cp
2. Which of the following commands can be used to display a text file's contents?
Please select all the correct answers.
A. ls
B. more
C. less
D. cat
3. Which of the following commands can you use to search for something within
the filesystem?
Please select all the correct answers.
A. which
B. grep
C. slocate
D. find
4. Which of the following commands below takes output from the ls -l
command and passes it on to more, then displays the final output one page at a
time?
Please select the best answer.
A. ls -l >> more
B. ls -l < more
C. ls -l > more
D. ls -l | more
5. Which of the following allows you to save the result of the command which
slocate to the file output?
Please select the best answer.
A. which slocate > output
B. which slocate < output
C. which slocate 2> output
D. which slocate | output
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux file access permissions
Define file access permissions.
Determine When you are looking at your files you can determine the
your level of level of access granted by using the ls -l command,
access which is the long listing that shows all attributes for a file.
For example, the following output shows the file attributes
for temp.txt.
The access permissions are shown at the far left, (specifically
the portion which reads -rw-r). The first character
indicates the file type. In the example it's a dash, which
means it is a regular file. The following nine locations
indicate the owner, group, and other permissions, in order of
read, write, and execute from left to right.
The following MouseOver allows you to look at the previous
ls -l more closely and define each part of the expression:
Transcript
Next lesson In the next lesson, you will learn how to change permissions
from the command line.
Quiz
Before moving on to the next lesson, click the Quiz button to
review how permissions are used in Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Changing permissions from the
command line
Describe how to change permissions in Linux.
Changing
permissions:
As noted in the previous lesson, permissions control the
the numeric level of access that is given for particular files. They can be
method modified so as to grant or deny access for the owner, the
group, and for all other users. The command that changes the
permissions on a file is chmod, which stands for "change
mode."
The proper syntax for the chmod command is:
chmod [-R] mode file...
4 Read
2 Write
1 Execute
0 None
Transcript
Owner u
Group g
Other o
All users a
Read r
Write w
Execute x
An example of the command to grant write access to the file
named .bash_profile for the owner's group is:
Next lesson In the next lesson, you will learn how security is managed in
Linux.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice changing permissions of a preexisting set
of files and directories using numeric or simple commands.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux file access permissions
Example of permissions (Mouseover
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
2. Which category of user indicates global access to a file for all users on the
Linux system?
Please select the best answer.
A. Owner
B. Group
C. Other
D. Root
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux file security overview
Describe how security is managed in Linux.
Transcript
Next lesson In the next lesson, you will learn how to set default file
permissions.
Exercise
Before moving on to the next lesson, click the Exercise
button to test your knowledge of permissions commands.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Changing permissions from the command line
Using numeric values and changing
permissions (Simulation transcript)
1. The current permissions for the file named 'temp.txt'
indicate read and write by owner only. View the
permissions by typing "ls -l temp.txt"
2. We will now change the permissions so that the group
has read access. To do this we use the command
"chmod 640 temp.txt."
3. The resulting list of permissions shows read and write
permission for the owner, and now read permission for
group. View this with the command "ls -l temp.txt"
4. Now, we will add read permission for other users
using the chmod command again. Type "chmod 644
temp.txt" to change the permissions.
5. View the access level by typing "ls -l temp.txt" again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Step 1: You will be prompted with a login: prompt. Enter your username, then you'll be prompted with
a password: prompt. Enter your password here. You should now see the shell prompt like this:
username@redhat $
Step 2: Change the permissions on file1.txt so that only the owner has read, write, and execute
access.
Step 3: Change the permissions on file2.txt so that owner has read and write, and group only has
read access.
Step 4: Set the permissions for file3.txt to read and write for owner, group, and other.
Step 5: Change permissions on file4.txt so only the owner has read and write access, but other has
read access.
Step 6: Set the permissions on file5.txt to read for owner; read, write, and execute for group; and
read and write for other.
Submitting your exercise
Enter your answer into the text box below. Click the OK, I'm Done button to submit your solution to a
tutor.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Changing permissions with GMC
Demonstrate how to change permissions with
GMC.
Transcript
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Linux file security overview
Linux file security (FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are five objectives, and the corresponding commands required to meet those
objectives in the right column. Click once on an objective in the left column, then click once on the
command in the right column to make a match.
When you think you have all of the items matched correctly, click the Done button. Green lines mean the
match is correct, red lines mean the match is incorrect. If you didn't get the matches right the first time,
click Clear to erase your matches and try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
New terms Here are some of the new terms you encountered in this
module.
● Chmod
● Execute access
● Permissions
● Read access
● Write access
Coming up In the next module, you will learn how to use the Pico text
editor.
Quiz
Before moving on to the next lesson, click the Quiz button to
review what we have covered in this module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Changing permissions with GMC
Changing permissions with GMC
(FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Using the pico text editor
Module introduction
Linux comes with a variety of text editors by default. The
most popular among these are pico, vi, and Emacs. Many
configuration issues are best handled by editing text files.
For this reason, regardless of which of these editors you
decide you like best, it is important to be able to use at least
one text editor under Linux. In this module, you'll learn to
use the pico text editor to manipulate text files.
By the end of this module, you will be able to:
● List the features of pico text editor
● Edit a document
Next lesson Most people choose an editor because they are comfortable
with the user interface. In the next lesson, you'll learn about
the features of the pico text editor.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
2. The following command: chmod 764 will grant execute permission to what
user category?
Please select the best answer.
A. Owner
B. Other
C. Group
D. Root
3. What option can the chmod command accept to indicate every user category
using the alphabetic method?
Please select the best answer.
A. a
B. u
C. g
D. o
4. In the GMC, mode 666 indicates what level of permission?
Please select the best answer.
A. Read, write and execute for all three user categories
B. Read and execute for all three categories
C. Write and execute for all three categories
D. Read and write for all three categories
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introduce the pico text editor
List the features of pico text editor.
Pico also has extensive help features to help you keep track
of the commands that are available to you.
The advantage You may be surprised to learn that pico is strictly a keyboard
of pico text editor, and does not use a mouse. Although this appears
at first to be a disadvantage, it is actually a tremendous
advantage. A graphical editor uses a significant amount of
processing resources. If for some reason X Windows
malfunctions, or you do not wish to use already strained
resources, you will always be able to use pico.
Next lesson Next, you'll learn to launch pico from the command line.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Launching pico
Launch pico from the command line.
Launching
pico
Launching pico is easy. From the command line, you use
the syntax below:
pico [filename]
pico /etc/profile
Next lesson For most people learning Linux, editing a document is the
most challenging task. You'll learn how to do this in the next
lesson.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Editing a document
Edit a document.
Basic To delete text, as with most other text editors, use either the
keystroke Backspace or Delete keys.
commands
Although the pico help menu is located on the screen, we've
provided a list of some of the more useful commands in the
table below.
Pico commands using the Ctrl key are not case-sensitive. You may
see commands throughout this module in both, lower and upper
case.
Pico commands quick reference table
Next lesson The cut, copy, and paste features available in other editors
are also available in pico. In the next lesson, you'll learn
about these features.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Launching pico
Opening pico in GNOME
When you are in GNOME, you have access to all of your
command line tools. All you have to do is open a virtual
terminal, which is a window that gives you a command line
prompt.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Cutting, copying, and pasting using
pico
Use pico's cut, copy, and paste features.
Cutting,
copying, and
There are some pointers to keep in mind when using the cut,
pasting copy, and paste features in pico. Before you can cut or copy
text, you need to first highlight it.
Once the text is highlighted, regardless of whether you want
to copy or cut and paste, you then need to cut the highlighted
or marked text.
If you want to copy text rather than cut it out, just paste it
right back into place. Otherwise, move the cursor to where
you want to put the new copy and paste (again).
Steps to cut, Whether you are using cut, copy, or paste you should begin
copy, and as follows:
paste
Action Steps to cut, copy, and paste
Paste Position the cursor in the new location where the text is to be
pasted and enter Ctrl-U.
Copy You have to cut and paste to copy text. Once the cursor is
positioned, enter Ctrl-K to cut the text. Then, enter Ctrl-U
to put it back. Now, you can move the cursor anywhere
within the document and paste in a copy by entering
Ctrl-U.
Next lesson Once you've created a document, you need to save and quit.
You'll learn how in the next lesson.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete a lab on using the edit, copy, and paste
features in pico.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Saving and quitting
Save and quit a document.
Saving your You save the current document by entering Ctrl-o. This
work using brings up the following text on the bottom of your screen:
Ctrl-O
If you do not want to save the file to the directory you ran pico
from, enter the full path of the directory you wish to save to and
the filename while saving.
Quitting pico The Ctrl-x command quits pico. When you quit pico, you
using Ctrl-X will also be prompted to save the file if you have made any
changes since your last save. If you answer yes, you will be
presented with a filename, just as you would with Ctrl-o.
Again, you can change the filename if you wish. If there
have been no changes made to the work buffer, you will not
be prompted for a new filename and pico will simply exit.
Next lesson You'll learn about pico's help feature in the next lesson.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete a lab on applying what you have learned
about Pico in this module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Step 1: Launch pico: From the command line, type the syntax below. Remember to separate the
command and the filename with a space.
pico picotest
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Getting help in pico
Use the help feature in pico.
Getting help After starting pico, enter Ctrl-g to pull up the pico help
screen. The movement commands for this section are as
follows:
● Scroll down through the help screens with Ctrl-v
(page down)
● Scroll up through the help screens with Ctrl-y
(page up)
● Exit the help screens with Ctrl-x (quit)
Exercise
Before moving on to the next lesson, click the Exercise
button to complete a lab on using the help feature in pico.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Instructions
Step 1: Launch pico: Open the file picotest2 by typing:
pico picotest2
Step 2: Insert text: Type the following text, then add some of your own. It is important to save my work
regularly. Even though Linux is a very stable operating system, there can still be problems such as power
outages or someone tripping over the power cord that could cause me to lose everything I did up until the
last point I saved my data.
Step 3: Cut text: Move your cursor to the beginning of the file to the words "It is." Press Ctrl-6 to
start the highlighting, then move the cursor to right after the period at the end of the sentence. Now, cut
the text into the buffer by pressing Ctrl-K.
Step 4: Paste text: Move the cursor to the end of the file and press Enter so you are on a new line. Then,
press Ctrl-U to paste the text at this location.
Step 5: Save file: Press Ctrl-O to open the File Name to write dialog. Press Enter to save the file with
the currently assigned name.
Step 6: Quit and rename file: Go to the end of the document and press the spacebar. Now, press
Ctrl-X to quit the file. Since you made a change in the document, pico asks you if you want to save
the modified contents. Press y. Then, you get the File Name to Write dialog. Delete the current filename,
and type the following:
picotestnew
Step 7: Save your work: Now, press Enter to close and save the file.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
You are now familiar with one of the many text editors
available in Linux. This allows you to go ahead and start
creating documents either in the lab, or on your home Linux
machine.
You should now be able to:
● List the features of pico text editor
● Edit a document
New terms Here is a list of terms used in this module that may have been
new to you:
● argument
● Emacs
● vi
Coming up In the next module, you'll learn about working with the shell
environment.
Quiz
Before moving on to the next module, click the Quiz button
to check your understanding of the concepts and procedures
taught in this module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Step 1: Create the file: Type the following to open the file you need to work with:
pico labfile
Step 2: Enter the text: Type the following sentence, exactly as you see it:
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The shell as a working environment
Module introduction
The shell is the simplest form of user interface, the
command line interface. It acts as an intermediary between
the user and the kernel by accepting keystrokes from an input
device (your keyboard), sending the correct command to the
kernel, and then sending the output to a device that allows
you to see it (your monitor screen). The shell is an attempt to
make interaction with the system user-friendly by creating a
natural language interface. In this module, we will deal
primarily with the default Linux shell, called the bash shell.
By the end of this unit, you will know how to:
● Describe the shell and what it does
Next lesson In the next lesson, you will learn what the shell is and the
functions it performs.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
Module review
Each question is worth one point. Some questions ask you to select the best
answer, others ask you to select all the correct answers. To receive credit for
questions asking for all the correct answers, you must select all the correct
answers and only the correct answers.
1. What would you type in order to open the file mytext for editing in pico?
Please select the best answer.
A. pico > mytext
B. mytext pico
C. pico
D. pico mytext
5. What pico command would you use to cut out the text you just highlighted?
Please select the best answer.
A. Ctrl-Y
B. Ctrl-X
C. Ctrl-C
D. Ctrl-K
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
What is the shell?
Describe the shell and what it does.
Transcript
Next lesson In the next lesson, you will learn the advantages of each type
of shell in Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Available shells in Linux
List the available shells in Linux and the features
and advantages of each.
● C shell
● TC shell
● Korn shell
Next lesson In the next lesson, you will learn about the features of the
bash shell.
Exercise
Before moving on to the next lesson, click the Exercise
button to help familiarize yourself with the common
abbreviations for Linux shells.
Quiz
Before moving on to the next lesson, click the Quiz button to
review available shells.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
What is the shell?
The shell and what it does (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The bash shell
List the features of the bash shell.
Next lesson In the next lesson, you will learn about shell variables and
how they are used.
Exercise
Before moving to the next lesson, click the Exercise button
to review the most important features of the shells we have
discussed in this lesson.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Available shells in Linux
Command line editing
Although this may not seem like an enormous advantage, it
can be useful--especially if you are a new user and are
unfamiliar with the commands. When a shell does not allow
command line editing, it means that if you make a mistake
while typing in a command, you must go ahead and enter the
command anyway, because you are not allowed to backspace
and fix your mistake. You will simply have to wait until you
get another prompt, then try entering the command again.
Command line editing offers you the opportunity to fix an
error in a command or change your mind and use a
completely different command.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are five shell names; their corresponding abbreviations are listed in the right
column. Click once on a term in the left column, then click once on the abbreviation in the right column
to make a match.
When you think you have everything matched correctly, click the Done button. Green lines mean the
match is correct, and red lines mean the match is incorrect. If you didn't get the matches right the first
time, click Clear to erase your matches and try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
Available shells
Each question is worth one point. Some questions ask you to select the best
answer, others ask you to select all the correct answers. To receive credit for
questions asking for all the correct answers, you must select all the correct
answers and only the correct answers.
1. Which of the following was the original UNIX shell?
Please select the best answer.
A. Bourne again shell (bash)
B. Korn shell (ksh)
C. C shell (csh)
D. Bourne shell (sh)
2. Which two of the following shells are based primarily on the Bourne shell?
Please select all the correct answers.
A. bash
B. ksh
C. csh
D. tcsh
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Shell variables
Describe the use of shell variables and
demonstrate how to view them.
Viewing shell You can access all of the variables in the bash shell by
variables adding a dollar sign ($) to the front of the variable name. The
shell interprets this as the value associated with the current
variable. One common shell variable is the executable path,
identified by the $PATH variable. This variable sets which
directories are searched when you type a command. By
default, this contains directories such as /usr/bin and
/sbin. You can view the value of the $PATH variable by
using the following command:
Next lesson In the next lesson, you will learn how to prevent the
interpretation of special characters.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The bash shell
Bash in UNIX
The Bourne again shell (bash) was developed for the GNU
project, and uses the GPL as its license. The bash shell
attempts to comply with POSIX standards, which is a
standards organization that is used for many Unix system
programs and properties. These standards are put in place to
prevent too much variation in system programs, for the
benefit of users primarily, but also for programmers. For
example, the Linux kernel is not entirely POSIX compliant,
but it is designed to conform to the majority of standards that
apply to an operating system.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
The bash shell
The shell history feature
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are five terms; their corresponding definitions are listed in the right column.
Click once on a term in the left column, then click once on the definition in the right column to make a
match.
When you think you have all of the terms and their definitions matched correctly, click the Done
button--green lines mean the match is correct, red lines mean the match is incorrect. If you didn't get the
matches right the first time, click Clear to erase your matches and try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quoting special characters
Quote items on the command line to prevent the
interpretation of special characters.
Transcript
Next lesson In the next lesson, you'll learn how to recall commands from
the shell history.
Exercise
Before moving on to the next lesson, click the Exercise
button to practice quoting special characters on the command
line.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Recall and use previous commands
Recall previous commands using the history
command.
Transcript
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
[redhat@localhost redhat]$
Step 2: First show the $PATH variable using the following command:
Step 3: Try quoting the shell variable name with the double quotes:
[redhat@localhost redhat]$ echo
"$PATH"
Step 5: Last, try using the backslash in front of the dollar sign:
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
In this module, you learned about the shell and its functions.
You then saw the shells that are available to you in Linux.
You explored shell variables and saw demonstrations on
viewing them. You also learned how to quote special
characters. Finally, you learned how to recall previous
commands using the history command.
After completing all of the lessons and their learning checks,
you should now be able to:
● Describe the shell and what it does
New terms Here are some terms that may have been new to you in this
module:
● BSD style
● Command completion
● Command history
● Command line editing
● executable path
● Filename completion
● Filename expansion
● Kernel
● Natural language interface
● Shell
● Shell history
Coming up The next module in this series will teach you about printing,
file packaging, and miscellaneous commands.
Quiz
Before moving on to the next module, click the Quiz button
to review the concepts we have covered in this module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Recall and use previous commands
Ways to use the history command
(Simulation transcript)
1. Use the up arrow key to recall the previous command
issued, and hit Enter to execute it again.
2. Type the word history. This will display all the
commands stored in the history file, with the most
recent command at the bottom of the list.
3. A shorter form of this command is to type two
exclamation points !! and then hit the Enter key. This
also executes the very last command issued,
automatically.
4. You can see that the history command is listed
twice--once for the time you typed in history and once
for the time you used exclamation points (!!). If you
want to run one of the commands in this list, you may
type exclamation point and the number of the
command; for example, typing !31 will execute the
command identified by the number 31 in the list. Type
!31 now to see how this works.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing, file packaging, and
miscellaneous commands
Module introduction
Red Hat bundles a varied collection of tools and
applications with its base operating system. The selection
includes essential software such as text editors and Web
browsers and optional items like programming environments
and games. In this module, we will demonstrate the use of
some of the most common tools and explain why they will
undoubtedly come in handy.
After completing the lessons and learning checks in this
module, you will know how to:
● Use the print utility in Linux
Next lesson In the next lesson, you will learn how the print utility works
in Linux.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
5. You can recall the last command you typed by using what single key on the
keyboard?
Please select the best answer.
A. The Tab key
B. The backslash key (\)
C. The left arrow key
D. The up arrow key
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing in Linux
Describe how the print utility works in Linux.
Transcript
Next lesson In the next lesson, you will learn about PostScript and
ghostscript.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing PostScript and ghostscript
data
Explain PostScript and ghostscript.
Transcript
Next lesson In the next lesson, you will learn how to print from an
application.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing in Linux
Print utility (FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing from applications
Print from an application.
Transcript
Next lesson In the next lesson, you will learn to use various print
commands to print from the command line.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing PostScript and ghostscript data
Postscript and ghostscript (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing from the command line
Use various print commands to print from the
command line.
You can print from the command line with the line printer
spooling command, lpr. This command sends a print
request to the line printer daemon, where it is queued to be
printed. The default print queue is /dev/lp, but you can
specify a different queue with the -P option. The syntax for
the lpr command is as follows:
[root@localhost/root]#lpr -P lp1
file1.txt
Next lesson In the next lesson, you will learn how to query a print queue
and cancel a print job.
Exercise
Before moving on to the next lesson, click the Exercise
button to review the commands necessary for printing from
the command line.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Printing from applications
Printing from an application (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Querying and canceling
Query a print queue and cancel a print job.
Querying a
print queue
The lpq command provides a mechanism of querying the
print spool for the status of print jobs currently in the queue.
Just like the lpr command, lpq contacts the line printer
daemon (lpd) to determine the jobs in a particular queue. It
then shows the list of jobs in the queue in the order they were
received by the daemon. The owner of the print job is listed,
indicating who submitted the request to the queue. The
following is the syntax for the lpq command:
Transcript
Next lesson In the next lesson, you will learn how to use the mount
command to access filesystems.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
This exercise uses a Java applet to allow you to match items in the left column with
the items in the right column. If you do not have Java active in your browser or are
behind a firewall that does not allow Java applets, you will not be able to complete
this exercise. If you do not see the applet below, click OK, I'm Done to continue
with the course. You will receive full credit for this exercise.
Instructions
In the left column below are five commands with their resulting output listed in the right column. Click
once on a term in the left column, then click once on the definition in the right column to make a match.
When you think you have all of the command and their results matched correctly, click the Done button.
Green lines mean the match is correct, and red lines mean the match is incorrect. If you didn't get the
matches right the first time, click Clear to erase your matches and try again.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Accessing filesystems from the
command line
Use the mount command to access filesystems.
Accessing
filesystems
Filesystems are hard disk partitions that contain user
using the directories and files. While they are always on your hard
mount disk, they may or may not be available to your Linux system.
command Each hard disk partition is a separate filesystem, and these
must be mounted in order to access the data contained on the
partition. There are many filesystems that are mounted by
default when the system boots, for example, your root
filesystem (/) and the /home filesystem (if separate). You
can also mount network drives, either at boot time or
afterwards. Typically, CD-ROM and floppy drives are not
mounted at startup.
To mount a filesystem from the GNOME panel, select:
System/Disk Management. This utility gives the user
the ability to view the filesystems available and mount or
unmount them. Note that it may be possible to format the
filesystem from this utility as well. The /etc/fstab file
contains a list of all the filesystems on the system, and
indicates the mountpoint that will be used when mounting
the filesystem.
The following MouseOver illustrates the user mount tool.
Transcript
Next lesson In the next lesson, you will learn how to access a DOS
diskette.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Querying and canceling
Querying and canceling (Simulation
transcript)
1. Spool a print job using the command lpr -h myfile.txt.
2. Now use the lpq command to query the status of the
print job.
3. Use the lprm command to remove your job from the
queue. Remember to follow this command with the
identifying number of your print job. If there were
other jobs in the print queue, submitted by other users,
you would not be able to remove them; you never have
the ability to remove jobs submitted by other users.
4. After removing the job from the queue, use the lpq
command again to verify that your job has actually
been canceled.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Accessing DOS diskettes
Access a DOS diskette.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Accessing filesystems from the command line
Using the Mount command (Mouseover
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Why archive files?
Detail the reasons for archiving files.
Creating an You create an archive with tar using the following syntax:
archive
Transcript
Discussion
Please consider going to the discussion area to comment on
your experience using archives in Linux or other operating
systems. There are quite a few methods, and even more
reasons for using archive tools. We'd like to hear what you've
used in the past.
Next lesson In the next lesson, you'll learn how to inspect archives and
extract information from them.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Working with archives
Demonstrate how to inspect and extract from
archives.
Inspecting an
archive
If you have an archive file, how do you tell what has been
archived inside it? The tar command provides for this with
the list option. The syntax for listing the contents of an
archive are as follows:
tar tf archive_name
tar tvf archive_name
Extracting Once you have determined what is in an archive with the list
from an option, you'll probably want to extract the files from the
archive archive. You can do this using the x option, for extract. The
syntax is:
tar xf archive_name
Next lesson In the next lesson, you will learn how to use file compression
and file compression utilities.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Why archive files?
Tar (FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
File compression
Use file compression and file compression utilities.
You can compress any type of file, but the space reduction
varies depending on the file type. Text files may be
compressed up to 75 percent or more, while binary files will
not produce such an extreme reduction in size. You'll often
see tar archives compressed, since the archive is often
times sent somewhere on the network or placed on floppy
disk. This minimizes the amount of time it takes to move the
archive.
Transcript
Next lesson In the next lesson, you will learn about gzip and archive
compression.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Gzip and archive compression
Describe how to use gzip and list the reasons for
compressing archives.
Using gzip
The standard Linux compression utility is gzip, and it has
the gunzip command that reverses the compression. gzip
adds the .gz extension to a compressed file. This utility
will compress text files up to 75 percent, reducing the space
used by quite a bit more than the compress command.
The syntax for both the gzip and gunzip commands is
as follows:
gzip myfile.txt
Transcript
Compressing tar can compress files it is adding to an archive using
archives gzip or compress with the use of a single option on
the tar command line. For gzip the option is z, and for
compress it is Z. Using these options forces the input files
through the gzip or compress command before creating
the archive. This works for both creation and extraction of
files.
So the files in the archive can be transported more quickly and easily
Exercise
Before moving on to the next lesson, click the Exercise
button to practice what you've learned in this lesson in the
lab environment.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
File compression
Using file compression and file
compression utilities (FlipBook
transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Module wrap-up
New terms Here are some terms that may have been new to you in this
module:
● gEdit
● ghostscript
● line printer daemon
● PostScript
● print queue
● printer daemon
Coming up The next module wraps up this course and gives you the
opportunity to practice what you've learned by completing a
case study.
Quiz
Before moving on to the next module, click the Quiz button
to review the concepts you have learned in this module.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Gzip and archive compression
How to use gzip (FlipBook transcript)
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Step 4: You will not be able to send this file to your tutor; instead make sure the final file is named
lesson11.tar.gz. If you have questions, send a note to your tutor, and explain that the compressed
file is in your home directory.
Lab HOWTO
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course project
Module introduction
You are only one step away from completing the course!
We have designed a case study to provide a final opportunity
for you to apply some of what you have learned.
In this module, you will complete a series of exercises in
which you respond to scenarios and troubleshoot various
problems that occur.
Within each exercise, we provide various resources, such as
a hardware inventory, email, online resources, planning tools
and an installation checklist, which will help you with each
task. You can access these items from a case file that looks
like this. Click the Case Files icon now:
Your role As anyone who has installed Linux will tell you, a successful
installation is no small feat for the beginner. Even if you've
been working with Linux for some time, a simple install
takes some time to plan.
In this module, you'll prepare for and complete a simulated
install of Linux. You will also complete an exercise in simple
filesystem navigation and comprehension. In completing the
course project, you must examine and coalesce the available
information.
In the first exercise, you'll work with information about your
hardware, consult the "online documentation" provided, and
review other sources of information to plan and execute a
successful installation.
In the second exercise, you'll be asked to troubleshoot a
problem regarding permissions, and will be assigned a list of
discrete tasks to resolve it.
After completing the two case-study exercises in this
module, you will have demonstrated your ability to:
● Determine the best partitioning scheme based on a
given scenario
● Partition Linux during the install of a GNOME
workstation dual-boot system using the Disk Druid
partitioning tool
● Describe hardware compatibility issues
● Create a directory
What's next? Next, you will begin the first exercise in the case study.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Quiz
2. What command displays all the jobs in the print queue named lp1.
Please select the best answer.
A. lpq -P lp1
B. lpr -P lp1
C. lprm -P lp1
D. lpr -h -P lp1
3. Which command lists the contents of the DOS diskette in the primary floppy
drive?
Please select the best answer.
A. mdir a:
B. mdir b:
C. mdir /dev/DOS
D. mcopy myfile a:\myfile
4. Which tar command creates an archive called myfile.tar and adds
the file named myfile1 to it?
Please select the best answer.
A. tar cvf myfile1 myfile2 myfile3
B. tar xvf myfile.tar
C. tar cvf myfile.tar myfile1
D. tar cvf myfile1 myfile.tar
5. The tar command can compress files as it archives them with what option?
Please select the best answer.
A. x
B. v
C. c
D. z
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
You're the installation expert
The scenario
As the proud owner of a shiny new Red Hat® Linux
CD-ROM, you are anxious to get started with installing
Linux on your home PC.
Because you use your machine primarily to do word
processing, surf the Internet, and play games, and you need
also to have access to both Linux and Windows so you can
still use the software you already own, you have opted to do
a Workstation dual-boot install. You know that this means
you'll be creating separate partitions for both Red Hat Linux
and Windows on your machine.
Exercise
Click the Exercise button to begin the course project.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Files, directories, and permissions
Scenario
Your system has been successfully installed, and up and
running for a few weeks, and you have spent many hours
carefully fine-tuning everything. However, you've recently
realized that you must have made a change somewhere that
you shouldn't have. Whenever you try to enter some of the
subdirectories in your home directory (or even view the
contents of files without entering them), you get a
permission-denied error message.
Your goal Your goal is to troubleshoot the problem. You need to figure
out exactly what changes need to be made to your files and
directories, so that you have full access to everything in your
own home directory and so no one else has access to
anything except what is in the public area on your filesystem.
Exercise
Before moving on to the next lesson, click the Exercise
button to complete an exercise on file manipulation.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Start by reviewing the instructions below. You will need to review the information presented in the case
file to answer the questions and to complete the simulation, then you'll need to submit your solution to a
tutor.
Instructions
1. Review the information in each of the tabs provided.
2. Evaluate the information presented to you, paying special attention to the partitioning structure.
3. Answer the questions listed below, and submit them to a tutor using the text entry box at the end of
the lesson.
4. Complete the simulation: a dual-boot installation using Disk Druid.
Questions
Describe your overall installation strategy, addressing each of the following in your answer.
1. List five questions you'd need to ask in preparing to conduct a Workstation dual-boot installation
for this system.
2. List one potential setback you've identified in the scenario, and describe the steps you'd take to
avoid this problem.
3. Complete the checklist provided, and reference it in your solution.
Hints
Consider the importance of not losing previous data, understanding how and why to bypass the default,
workstation partitioning setup, using Disk Druid over the FIPS partitioning tool, and having enough disk
space for both Windows and Linux.
Getting started
You know that before you get started planning your installation, you need to consider a few global
questions. You will not need to address these questions directly in your submitted solution. They are
simply provided to help you to get you started.
● Why are you installing Linux?
● How many users do you think will need access to this machine?
Use all the information available to you in the Case File below to accomplish your task.
Now that you have reviewed the questions, please continue with the simulation below.
Partitioning using Disk Druid
Since you'll be booting from the CD-ROM, you've already edited your machine's initial boot instructions,
contained in the BIOS. Since this is a direct install and you're still fairly new to Linux, you've decided to
opt for the default graphical install method using Disk Druid, a graphical tool that allows you to partition
your hard drive.
Remember that you'll need to use all the information available to you in the Resource file to accomplish
your task.
Let's get started!
Remember to complete the checklist provided, and reference it in your solution. Describe your overall
installation strategy, addressing each of the three questions listed above.
Getting feedback
When you have completed the exercise, submit your responses to your tutor for grading and assessment
by entering them into the text box below. Click the OK, I'm Done button to submit your answer to a
tutor. Remember to complete all parts of the exercise before submitting your solution to a tutor.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course conclusion
Congratulations! You made your way through the first
Transcript course in the Introduction to Red Hat® Linux series. Give
yourself a pat on the back. Linux is not an easy operating
system to master--but you're well on your way.
Now that you've completed this course, you should be able
to:
● Install Red Hat Linux
Next lesson In the next lesson, you'll find out what course you should
take next.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Exercise
Scoring
This portion of the course project is worth 10 points. To receive full credit, you'll need to use the Case
File to answer the questions below, and submit those solutions to a tutor.
Problem statement
Your job is to configure your home directory filesystem so that:
● It is secure
● Everyone is able to examine the contents of your public area (/home/redhat/pub), but is not
able change anything in it
You need to examine the current directory permissions to ensure that each of the triads (owner, group,
and other) is doing its job properly. You also need to consider what file permissions must be in place to
allow only read access to your pub directory.
You are placed in this directory automatically when you log in, since it is your home directory. Its
structure is as follows:
The long format file listing of your home directory itself is as follows.
Finally, the long format file listing of your home directory's contents is as shown below.
Instructions
You will need to do the following.
1. Change the permissions on your home directory so no one except you can enter it or use its
contents.
2. The file dans_file used to be in the list but is not anymore. This file was a symbolic link to
/tmp/dans. Restore the link.
3. Re-create your pub directory so users can list and read its contents, but not execute or alter
anything.
4. Explain how and why you chose to reconfigure permissions in your directory.
Getting feedback
When you've completed the exercise, submit your responses to your tutor for grading and assessment by
entering them into the text box below. Click the OK, I'm Done button to submit your answer to a tutor.
Remember to complete all parts of the exercise before submitting your solution to a tutor.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Where do you go from here?
In this course, you learned a great deal about how the Linux
filesystem works. You reviewed concepts relating to PC
architecture and you probably understand more than you ever
did before about the hardware in your system.
You're now ready to move to the next step! The next course
in this series covers the GUI in greater detail, and GNOME
in particular. You'll apply what you've learned about the
filesystem and file manipulation to make use of command
line tools and shell scripting to fine-tune your system.
Course PDF Don't forget that you can review the material in this course
file anytime and anywhere by downloading the compressed PDF
file available on the Resources page. This file contains all
lesson, quiz, and exercise content in the course.
Next lesson In the next lesson, we'll ask you for some feedback.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course conclusion
Way to go! (Audio transcript)
Well, we've covered a lot of ground here. You've
learned a lot about installing Red Hat® Linux and how to get
through the process with your sanity intact. You've learned
about the necessity of checking your hardware against the
compatibility lists in order to save yourself from headaches,
and you've completed a lot of simulations to prepare you for
the real thing!
You learned about how Linux sees the files and directories in
its filesystem and how to navigate through them, manipulate
them, and make sure that your basic levels of security are in
place by manipulating and understanding permissions.
Finally, you learned how to log in to the system and how
Linux knows who you are and how it keeps track of all the
different users it can handle.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
We'd love your feedback
Next lesson In the next lesson, we'll ask you to fill out our evaluation
form.
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Course survey
@SURVEY_CEU_TEXT@ @SURVEY@
Copyright © 2000 DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights reserved. Linux is a
registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo, and all Red Hat-based trademarks and logos
are trademarks or registered trademarks of Red Hat, Inc., in the United States and other countries.
Introduction to Red Hat Linux I
Glossary
Annihilate
An X Window System operation whereby a window is closed and the
running application is killed.
Argument
An additional value required to complete a command.
ASCII (American Standard Code for Information Interchange)
Represents raw text that can be typed from a keyboard.
Bash shell
The Bourne Again shell, an updated version of the original UNIX shell,
the Bourne shell (sh). This is the standard command line processor used
in Linux systems today, and was developed for the GNU project.
Binaries
A compiled program of instructions for the CPU, which is unreadable by
people. Executable programs.
BIOS (The Basic Input/Output System)
A chip on the computer’s motherboard that saves information about the
hardware on the machine. This chip has the responsibility of starting the
computer from power up, and then passing control to the operating
system.
Bleeding edge hardware
Hardware just released onto the market, using brand new technology.
Blocks
A chunk of data stored on media such as a hard drive.
Boot
To start up the computer.
Boot manager
Allows you to select the operating system you wish to boot into.
Boot procedure
The process the computer system goes through when powering up.
Bourne Again shell
The standard command line processor used in Linux systems today,
developed for the GNU project. The bash shell.
BSD style
One of the original versions of UNIX developed at the University of
California at Berkeley. Berkeley Systems Distribution (BSD) is the
parent of one family of UNIX operating systems, and is partially behind
Linux as well, along with System V. Some things in Linux are done the
BSD way.
Character device
A device which transmits data one character at a time, such as a printer.
Character wildcard
A character that is used in a regular expression. A character wildcard
represents one character only in a pattern.
Chip
Copyright © DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights
reserved. Linux is a registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo,
and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc., in
the United States and other countries.
Introduction to Red Hat Linux I
interaction with the shell more intuitive and closer to a normal manner of
speaking or writing.
Nongraphical Text-based interface
Refers to the command line interface.
Open source
The movement and practice of ensuring that source code is available for
people to examine.
Option
A command line parameter used to provide extra information to a
program.
Path statement
The path statement is the directory (folder) structure with a file name at
the end.
PCMCIA
(Personal Computer Memory Card International Association). A device
used to connect external hard drives and other components to a laptop
computer.
Permissions
Security features used in the Linux filesystem to determine who has
access to what. The ability to read, write, or execute a file, which can be
granted to a user or revoked from them.
Pico
A Linux text editor.
Pipe
A feature that allows you to take output from one command and feed it
as the input to another.
Plug and Play
Attribute of the device (video card, and so on.) that it can be configured
by the operation system, and requires little intervention by the user.
POSIX (Portable Operating System Interface for UNIX)
A standard that defines the interface among application programs and
the UNIX operating system.
PostScript
A common printer control programming language used for page layout.
PostScript was developed to allow a document to look the same
independent of what printer it was printed on.
Printer daemon
The program that controls the printer devices, as well as any requests
from users to print a job on the printer.
Print queue
The collection files that have been sent to the printer, but have not been
printed yet.
PS
Stands for PostScript. A common printer control language that was
developed to allow a document to look the same independent of what
printer it was printed on.
Copyright © DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights
reserved. Linux is a registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo,
and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc., in
the United States and other countries.
Introduction to Red Hat Linux I
Pseudo terminal
A device on the Linux system that acts like a terminal. Allows users to
log in as if they were connecting with a real terminal device.
RAM (Random Access Memory)
Your computer’s memory.
Range wildcard
A character used to represent a series of characters, such as a-z.
Read access
Permission to look at the contents of a file or directory.
Redirection
Diverting output from a program from its normal destination, for example
to a disk file rather than the screen.
Root user
The administrator of the machine, which has access to all commands and
all portions of the filesystem.
SCSI
SCSI is an interface that allows PCs to communicate with devices such
as disk drives, tape drives, CD-ROM drives, printers, and scanners
faster and more flexibly than interfaces such as IDE. Part of the
advantage of using SCSI is that you are not limited to the single SCSI
port you may have. With most SCSI cards, you can hang SCSI devices
off of one another and still use them all effectively in this way.
Shell
The command line interpreter on a Linux system. It takes input from the
user and sends instructions to the kernel to be performed.
Shell history
The record of the commands executed during a login session.
Source code
The files used to build a binary program.
Special character
A nonalphabetic or nonnumeric character that means something specific
to a shell. Examples are +, @, $, &.
SSH
Stands for Secure Shell. The SSH client is a separate program that you
install on your computer. In this course, SSH provides a secure terminal
connection from your computer to the computer running the Linux lab.
STDERR
Stands for STanDard ERRor. The output channel error messages are
sent to in Linux.
STDIN
Stands for Standard Input, and is the source for input from a user or
another program. This is usually the keyboard.
STDOUT
Stands for Standard Output, and is the destination for output in a
program. This is usually the screen, but can also be another program or
file.
Copyright © DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights
reserved. Linux is a registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo,
and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc., in
the United States and other countries.
Introduction to Red Hat Linux I
String
A collection of alphanumeric characters.
String wildcard
A character used in a regular expression that represents a string of
characters in a pattern.
Superuser
The system administrator, who has unlimited access. The superuser is
also known as root, and is the highest privileged user account on a Linux
system.
Swap partition
Hard drive space used when the computer’s memory is full.
Swap space
Hard drive space used when the computer’s memory is full.
Terminal
Historically a hardware device, but today more likely to be a pseudo
terminal. An I/O device that usually has a keyboard for input and a
screen for output.
Text editor
A text editor is a program that allows you to view and work on a file in a
window. If you have used a word processing program like Microsoft
Word® you have used a text editor.
Vi
A text editor used to edit files.
Virtual terminal
One of the six available login sessions on a Linux box.
VRAM (Video Random Access Memory)
The memory chips on a video card.
Wildcard
A character used to represent other characters.
Words
Groups of characters on the command line which are broken up by the
shell and then executed by the kernel.
Work buffer
This is a temporary space where work is kept before it is saved to the
file. This space is often a file in the /tmp directory. For example, if you
are working in an editor, the file is opened as a copy and a version is
typically saved in /tmp with some unintelligible name. Until you save
changes, you are working on the copy in /tmp or on one held in RAM,
not on the file itself.
Write access
Permission setting that allows you to save data to a location or to a
specific file.
X Windows System
The standard GUI for UNIX and Linux. It uses representative icons,
windows, menus, and a mouse pointer to interact with the computer
operating system.
Copyright © DigitalThink, Inc. All Rights Reserved. Portions Copyright 2000 Red Hat, Inc. All rights
reserved. Linux is a registered trademark of Linus Torvalds. Red Hat, the Red Hat "Shadow Man" logo,
and all Red Hat-based trademarks and logos are trademarks or registered trademarks of Red Hat, Inc., in
the United States and other countries.