Using Linux to Teach Unix System Administration
When you are done entering the linux command-line options, press enter. After all the messages detailing unsuccessful checks for various hardware devices, the system gives you a login prompt. The following four options are displayed on the screen:
demo--gives an X-windows demo program that runs very slowly from the CD-ROM on the first use, but runs much more quickly once it is in memory.
guest--sets up a guest login with normal user rights. This is useful for teaching labs in which students need to determine access rights for certain files and directories by accessing them as guest.
install--allows you to install Linux and gives several menus on the screen.
root--gives you permissions to all files and commands.
For the purposes of this discussion, a root login is assumed. When you type the mount command without arguments, the screen output will look similar to the following:
/dev/hdd on / type iso9660
/dev/ramdisk on /ramdisk type ext2 (rw) /proc on on type /proc (type)
/dev/hdd refers to the CD-ROM mounted as root. /dev/ramdisk refers to the file system named /ramdisk, which is using internal RAM and can to be altered. /proc is the standard Unix pointer location for devices.
I have my students enter the following command:
mkdir /ramdisk/mnt /ramdisk/dos
This command creates two directories on /ramdisk to be used as follows:
/ramdisk/mnt is used to mount a Unix-formatted diskette.
/ramdisk/dos is used to mount a DOS-formatted diskette.
You format a 1.44MB diskette by typing the command:
The following output will appear on the screen:
Double sided, 80 tracks, 19s sec/track. Total capacity is 1440KB formatting...done verifying... done
Note that formatting will destroy any files already on the diskette you insert.
Now, to create a Unix file system on the diskette, type the following command:
You can then mount the diskette by typing:
mount /dev/fd0H1440 /ramdisk/mntNow, when you type mount alone, the following output appears on the screen:
/dev/hdd on / type iso9660 (ro)/dev/ramdisk on /ramdisk type ext2 (rw) /proc on on type /proc (type) /dev/fd0u1440 on /ramdisk/mnt type ext2 (rw)
Linux files can now be saved to /ramdisk/mnt. To unmount the diskette use the command:
It is sometimes necessary to transfer student assignments from the Linux box to the AIX box. Because networking is not done under Linux, it is necessary to use the diskette as the transfer media. The transfer is done using FTP from a DOS/Windows PC to the AIX box.
You will need to format the diskette under DOS. (Be sure you unmount any diskettes from the above exercise.) DOS formatting is done in Linux with the command:
Mount the DOS diskette with the command:
mount -t msdos /dev/fd0H1440 /ramdisk/dosTyping mount alone produces the following output:
/dev/hdd on / type iso9660 (ro)/dev/ramdisk on /ramdisk type ext2 (rw) /proc on on type /proc (type) /dev/fd0u1440 on /ramdisk/dos type msdos (rw)
You can now save files in DOS format to /ramdisk/dos. Note that you must use the standard DOS file naming convention of up to 8 characters for the prefix, then a period, then up to 3 characters for the extension. You can unmount the diskette with the command:
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide