List the files in the current directory

Assignment Help Operating System
Reference no: EM132187680

Question: Working on the Command Line

These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following and write down the commands.

Lab 2.1 Manage Files

STEP 1. Open a terminal window.

STEP 2. Display your current directory.

STEP 3. Using an absolute pathname, switch to the /etc directory.

STEP 4. Using a relative pathname, move to the /etc/skel directory.

STEP 5. Using a relative pathname, move up one directory.

STEP 6. List the files in the current directory.

STEP 7. Perform a "long display" listing of the files in the current directory.

STEP 8. List all the files in the current directory that begin with the letter s.

STEP 9. Run the command that will determine the type of contents in the /etc/group file.

STEP 10. Display only the last five lines of the /etc/group file.

STEP 11. Execute the command to return to your home directory.

STEP 12. Make a directory named data in the current directory.

STEP 13. Copy the /etc/passwd file into the data directory.

STEP 14. Copy the /etc/ppp directory into the current directory (and ignore any "Permission denied" error messages).

STEP 15. Rename the ppp directory that is located in the current directory to peers.

STEP 16. Update the timestamp of the data/passwd file to the current date and time.

STEP 17. Create a new empty file named test in the data directory.

STEP 18. Delete the data/passwd file.

STEP 19. Delete the peers directory.

Lab 2 Using Shell Features

STEP 1. Open a terminal window.

STEP 2. Display the value of the HOME variable.

STEP 3. Display all the shell variables and values.

STEP 4. Display the value of the TEST variable. (Note that this variable currently has no value.)

STEP 5. Change the current shell so that an error message will be displayed when an undefined variable is used.

STEP 6. Modify the PATH variable to include the /opt directory.

STEP 7. Create a new environment variable named EVENT and set it to the value "now" by using a single command.

STEP 8. Display all the environment variables.

STEP 9. Create an alias in the current shell for the ls command so it will run the command ls -a.

STEP 10. Display all the aliases for the current shell.

STEP 11. Remove the fgrep alias from the current shell.

STEP 12. Display a list of previously executed commands.

STEP 13. Re-execute the last ls command from the history list.

STEP 14. Change the maximum number of commands stored in the history list for the current shell to a value of 2000.

STEP 15. Execute the ps -fe command and pipe the output to the less command.

STEP 16. List all filenames in the /etc directory structure (including subdirectories) that are group owned by the lp group.

STEP 17. Display all the files in the /etc/passwd file that contain at least three sequential numbers.

STEP 18. Display the /etc/passwd file with all occurrences of root replaced with XXXX.

Lab 2 Compressing Files

STEP 1. Open a terminal window.

STEP 2. While using the verbose feature, create a tar file named ppp.tar that contains the contents of the /etc/ppp directory. (Ignore any error messages.)

STEP 3. List the contents of the ppp.tar file.

STEP 4. Create a directory named tar_data in the current directory.

STEP 5. Extract the contents of the ppp.tar file into the tar_data directory.

STEP 6. Compress the ppp.tar file by using the gzip command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.gz.

STEP 7. Compress the ppp.tar file with the bzip2 command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.bz2.

STEP 8. Compare the size of the ppp.tar.gz and ppp.tar.bz2 files to determine which one is smaller.

STEP 9. Delete the ppp.tar file.

STEP 10. Unzip the ppp.tar.gz file.

Reference no: EM132187680

Questions Cloud

Develop a request for proposal plan : Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery.
What is the weighted average cost of capital : What is the weighted average cost of capital and What is the salvage cash flow of the new equipment? Include the income tax effect
Develop a chain of custody form to be used within a business : In your investigative journal, develop a chain of custody form to be used within a business based on forensic notes for the final project.
Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.
Overview of key issues addressed in the section : Analysis and Critical Thinking Thoughtful analysis is performed to help situate the evidence within the team argument and provide engagement with the topic
What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Reviews

Write a Review

Operating System Questions & Answers

  Discuss and provide examples of mutual exclusion

Discuss and provide examples of the following concurrency issues associated with an OS: 1. Mutual exclusion 2. Deadlock 3. Starvation

  Describe five recommendation for protecting operating system

Describe five recommendations for protecting the operating system. What are the main differences between a local policy and a domain policy?

  The dining philosophers problem

Assume the Dining Philosophers problem. Explain the problems and assess what will happen if we allow the following code:a) Pick up chopstick on right, If chopstick on left is free, take it; else drop right chopstick. When done, drop both chopsticks.

  Computing total pay and net pay

Construct a Unix shell script to input number of hours worked and pay rate and compute the total pay, then the social security amount, then the net pay.

  How can an associative memory be implemented

As technology progresses, it may one day be possible to put thousands of identical CPUs on a chip. If all CPUs can read and write three shared registers, how can an associative memory be implemented?

  Simulate and evaluate a virtual memory system

Simulate and evaluate a virtual memory system, and experiment with different page replacement algorithms. You will need a threads package, e.g., pThreads thread package.

  Difference between a policy and a procedure

Write a 500+ word paper that answers and fully discusses the topic questions. What is the difference between a policy and a procedure?

  How would you solve problem by altering the file structure

What data redundancies do you detect, and how could these redundancies lead to anomalies?

  Discuss the differences between windows and mac os

Apple's Mac OS is a major competitor for Windows and many people feel very strongly about choosing one over the other. Locate articles online that discuss the differences between Windows and Mac OS

  How to implement a priority-based scheduler for xv6

COP4610: Introduction to Operating Systems Project: Priority-based Scheduler for Xv6. In this assignment, you will learn how to implement a priority-based scheduler for xv6. To get started, download a new copy of the xv6 source code from here. Do N..

  Election algorithm for bidirectional rings

The ring algorithm supposes that the links are unidirectional and that every procedure sends its message to the neighbor on the right. The main data structure used through the algorithm is the active list,

  How use social engineering techniques to gather intelligence

Pretend you are Kevin Mitnick (the greatest social engineer) how would you use social engineering techniques to gather intelligence on a company's network? Be specific, what techniques would you use to gather what information?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd