Linux Power User - Student Exercises (IBM Learning, 2004, Course Code QLX02)
Linux Power User - Student Exercises (IBM Learning, 2004, Course Code QLX02)
cover
Linux
Power User
(Course Code QLX02)
Student Exercises
ERC 3.1
Trademarks
IBM® is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX® AS/400® AT®
DB2® Domino® iSeries™
Lotus® OS/2® PowerPC®
PS/2® pSeries® RS/6000®
S/390® xSeries® zSeries®
Microsoft, Windows and Windows NT are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Intel and Pentium are trademarks of Intel Corporation in the United States, other countries,
or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Linux is a registered trademark of Linus Torvalds in the United States and other countries.
Other company, product and service names may be trademarks or service marks of others.
The information contained in this document has not been submitted to any formal IBM test and is distributed on an “as is” basis without
any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer
responsibility and depends on the customer’s ability to evaluate and integrate them into the customer’s operational environment. While
each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will
result elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.
© Copyright International Business Machines Corporation 2001, 2004. All rights reserved.
This document may not be reproduced in whole or in part without the prior written permission of IBM.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions
set forth in GSA ADP Schedule Contract with IBM Corp.
V2.0
Student Exercises
TOC Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
TMK Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM® is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX® AS/400® AT®
DB2® Domino® iSeries™
Lotus® OS/2® PowerPC®
PS/2® pSeries® RS/6000®
S/390® xSeries® zSeries®
Microsoft, Windows and Windows NT are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Intel and Pentium are trademarks of Intel Corporation in the United States, other countries,
or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Linux is a registered trademark of Linus Torvalds in the United States and other countries.
Other company, product and service names may be trademarks or service marks of others.
Required Materials
• A set of installation CDs for your distribution
Exercise Instructions
Note: The exercises in this course material have been designed for and tested on the
following three distributions:
• Fedora Core 1
• Red Hat Enterprise Linux 3 Workstation
• SUSE Linux Professional 9.0
If you are using one of these three distributions, follow the instructions below that apply to
your distribution. If you are using another distribution, or another version of one of the three
distributions above, then your instructor will give you additional information.
Depending on the circumstances, your instructor will loan you a full set of CDs for each
distribution, so you can perform a CD-based install, or your instructor will loan you a
network install CD, so you can perform a network-based install.
If you need to perform a network install, your instructor will give you additional information,
specifically:
• The install method: NFS, FTP or HTTP
• The IP address that is to be used for your workstation, if DHCP is not used.
• The name or IP address of the install server
• The path to the installation images on the install server
EXempty __ 6. (CD-based install only) Fedora will now start the graphical install method. This might
take a couple of minutes. At the graphical “Welcome to Fedora Core” screen, click
Next.
__ 7. Choose the language for the installation process and click Next.
__ 8. Choose your keyboard model and layout, and click Next.
__ 9. (Network-based install only) Choose the network installation method: NFS, HTTP or
FTP.
__ 10. (Network-based install only) Configure the local IP configuration: DHCP or fixed IP.
__ 11. (Network-based install only) Enter the details of the network install server.
__ 12. (Network-based install only) Fedora will now start the graphical install method. This
might take a couple of minutes. At the graphical “Welcome to Fedora Core” screen,
click Next.
__ 13. Choose your mouse type and port. If you have a two-button mouse, select “Emulate
3 Buttons” as well. Click Next.
__ 14. Choose your monitor and click Next.
__ 15. Fedora will now try to detect an existing installation. If an existing installation has
been detected, you will see the “Upgrade Examine” screen. In this screen select
“Install Fedora Core”. Click Next.
__ 16. At the “Installation Type” screen, choose the “Workstation” installation type. Click
Next.
__ 17. At the “Disk Partitioning Setup” screen, Choose to “Manually partition with Disk
Druid”. Click Next.
__ 18. The Disk Druid screen will appear and show the current layout of your disk(s). If
everything is correct, you should only see a small (200-500 MB) Windows
9x/ME/NT/2000/XP partition.
You can now start adding Linux partitions. Make sure you create two additional
partitions:
• One partition will be used as root partition. Its mount point should be “/”, the
partition type should be “Linux native”, the size of this partition should be 3.5
Gigabytes (3500 Megabytes) and should be formatted with an ext3
filesystem.
• The second partition will be used as swap space. A swap space does not
have a mount point (it will show as “<Swap>”). The size should be equal to
the amount of real memory, with a maximum of 256 MB, and the partition type
should be “Linux swap”.
__ 19. Let the instructor check your partition configuration before you save it! After
the instructor has checked your partition configuration, click Next.
__ 20. The install program will now allow you to configure your boot loader. You can accept
all defaults here:
• Use GRUB as the boot loader
• The default boot image is Fedora Core, and Windows is also bootable.
• Do not configure a boot loader password.
__ 21. Configure your network adapter(s). Your instructor will tell you whether to use DHCP
or not. If not, he or she will provide you with the IP Address, Netmask, Network and
Broadcast addresses, and with the Hostname, Gateway and DNS addresses. Enter
these values, double-check them and click Next.
__ 22. The next screen allows you to configure firewall rules. We're not going to use this
type of firewalling, so select “No firewall” and click Next.
__ 23. The installer will now ask for languages to be installed. This will, among other things,
depending which spell checker libraries will be installed. So select all languages you
are planning to use on your system. Click Next.
__ 24. Now select your Time Zone, then click Next.
__ 25. In the next screen you need to set the root password. For convenience in the class,
set the root password to ibmlnx. Click Next.
__ 26. At the “Workstation Defaults” screen, select “Customize software packages to be
installed”. Then click Next and add the “KDE Desktop Environment” group. Click
Next.
__ 27. Note the location of the log file: /root/install.log and click Next.
__ 28. Fedora will now format the filesystems and install Fedora Core 1. This may take
anywhere from 5 minutes to an hour, depending on the number of packages to
install, and the speed of the computer.
While installing, you can see what is going on in detail by switching to the third
virtual terminal with Ctrl-Alt-F3. Switch back with Alt-F7. Also take a look at other
virtual screens (1 through 6).
__ 29. Choose to create a custom boot disk for your system. You will need a blank floppy
for this, which your instructor will provide.
__ 30. Your installation is now complete. Remove the custom boot disk from the drive and
click Reboot to reboot your system.
__ 31. When your Fedora system boots for the first time, the Fedora Setup agent is started.
Click the “Next” button.
__ 32. Read the License Agreement, select “Yes, I agree” and click Next.
__ 33. Check the date and time. If the network has an NTP server, configure it here as well.
Click Next.
EXempty __ 34. Add a personal user account for yourself, with a password you make up yourself.
Then click Next.
__ 35. Verify that your sound card has been detected and is configured correctly, by playing
a test sound. Then click Next.
__ 36. Do not install additional software. Click Next, then click Next again.
EXempty __ 16. The Disk Druid screen will appear and show the current layout of your disk(s). If
everything is correct, you should only see a small (200-500 MB) Windows
9x/ME/NT/2000/XP partition.
You can now start adding Linux partitions. Make sure you create two additional
partitions:
• One partition will be used as root partition. Its mount point should be “/”, the
partition type should be “Linux native”, the size of this partition should be 3.5
Gigabytes (3500 Megabytes) and should be formatted with an ext3
filesystem.
• The second partition will be used as swap space. A swap space does not
have a mount point (it will show as “<Swap>”). The size should be equal to
the amount of real memory, with a maximum of 256 MB, and the partition type
should be “Linux swap”.
__ 17. Let the instructor check your partition configuration before you save it! After
the instructor has checked your partition configuration, click Next.
__ 18. The install program will now allow you to configure your boot loader. You can accept
all defaults here:
• Use GRUB as the boot loader
• The default boot image is Red Hat Linux, and Windows is also bootable.
• Do not configure a boot loader password.
__ 19. Configure your network adapter(s). Your instructor will tell you whether to use DHCP
or not. If not, he or she will provide you with the IP Address, Netmask, Network and
Broadcast addresses, and with the Hostname, Gateway and DNS addresses. Enter
these values, double-check them and click Next.
__ 20. The next screen allows you to configure firewall rules. We're not going to use this
type of firewalling, so select “No firewall” and click Next.
__ 21. The installer will now ask for languages to be installed. This will, among other things,
depending which spell checker libraries will be installed. So select all languages you
are planning to use on your system. Click Next.
__ 22. Now select your Time Zone, then click Next.
__ 23. In the next screen you need to set the root password. For convenience in the class,
set the root password to ibmlnx. Click Next.
__ 24. At the “Workstation Defaults” screen, select “Customize the set of packages to be
installed”. Then click Next and add the “KDE Desktop Environment” group. Click
Next.
__ 25. Note the location of the log file: /root/install.log and click Next.
__ 26. Red Hat will now format the filesystems and install Red Hat Linux. This may take
anywhere from 5 minutes to an hour, depending on the number of packages to
install, and the speed of the computer.
While installing, you can see what is going on in detail by switching to the third
virtual terminal with Ctrl-Alt-F3. Switch back with Alt-F7. Also take a look at other
virtual screens (1 through 6).
__ 27. The next screen will allow you to configure your graphical adapter. Most graphical
adapters will be autodetected. If your graphical adapter was not autodetected you
will need to choose the correct one from the list. Then click Next.
__ 28. The next screen will allow you to configure your monitor. Modern monitors can be
autodetected and the monitor found will be selected. If your monitor was not
autodetected, you will need to choose the correct one from the list. If your monitor
was not listed, select “Generic Monitor”. Then click Next.
__ 29. The next screen will allow you to configure your color depth and resolution. Make
sure to test your configuration. When done, click Next.
__ 30. Your installation is now complete. Click Exit to reboot your system. When the CD
drive opens, remove your CD.
__ 31. When your Red Hat Linux system boots for the first time, the Red Hat Setup agent is
started. Click the “Next” button.
__ 32. Read the License Agreement, select “Yes, I agree” and click Next.
__ 33. Check the date and time. If the network has an NTP server, configure it here as well.
Click Next.
__ 34. Add a personal user account for yourself, with a password you make up yourself.
Then click Next.
__ 35. Verify that your sound card has been detected and is configured correctly, by playing
a test sound. Then click Next.
__ 36. Do not register with the Red Hat Network. Then click Next.
__ 37. Do not install additional software. Click Next, then click Next again.
• As software, make sure that you add “GNOME system” to the default
selection of software.
• Make sure that your windows partition is included at the “sections” bullet of
your boot loader.
• Make sure the correct timezone is selected.
• Make sure the correct language is selected.
Click “Accept” and click “Yes, install” at the popup screen. SuSE will now install
itself. This may take 5 minutes to an hour, depending on the speed of your
computer.
__ 14. Note that SuSE will automatically reboot when it is nearly finished with CD1. This is
normal. When the CDs boot screen appears, do nothing so that the system boots
from hard disk. This will continue the installation process automatically.
__ 15. When the installation is finished, you need to enter the root password. For
convenience in class, use ibmlnx as the root password.
__ 16. The next screen allows you to configure your network. Make sure all detected
values are ok. If necessary, consult your instructor for IP addresses and such. Then
click Next.
__ 17. If you have an internet connection, you can test your internet connection and check
for the latest updates. Click Next.
__ 18. If you tested your internet connection and checked for updates, then you might get a
pop-up window asking you whether you want to download and install available
updates. Select “No, Skip Update” in this screen: we will update the system
manually later. Click Next.
__ 19. Select “Stand-Alone Machine” as User Authentication Method. Click Next.
__ 20. Add a local user account for yourself, using a secret password. Do NOT select “Auto
Login”. Then click Next.
__ 21. SuSEConfig will now execute several configuration scripts. This might take several
minutes.
__ 22. If you feel like it, read the release notes for this version. Then click Next.
__ 23. Check your hardware configuration, then click Next.
__ 24. Click Finish.
__ 25. Remove the last install CD from the CD-drive.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 3. Using the System 3-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Logging in on a virtual terminal
In this section you are going to log in to the system using both text and graphical virtual
terminals.
__ 1. If the install went correctly then you should now see a graphical login prompt. If this
is not the case, ask your instructor to fix this. (You will learn how to do this yourself
later in the course.)
__ 2. Verify that you indeed have seven different virtual terminals. Cycle through them by
pressing Alt-Fn, where n is the terminal number you want to access. Use Ctrl-Alt-Fn
when you are in a graphical terminal.
__ 3. In your first virtual terminal (tty1), log in to the system with your own username which
you also configured when installing the system.
__ 4. In your second virtual terminal (tty2), log in to the system as root. After having
logged in, look at the command prompt. Do you notice anything different from the
command prompt in the other virtual terminals?
__ 5. In your seventh virtual terminal (tty7), log in to the system with your own username
and password.
__ 6. Open a terminal window. Take a look at the command prompt. Does it differ from the
command prompt on tty1? Why or why not?
Basic Commands
In this section we are going to execute some basic commands, in order to familiarize
yourself with the command syntax of Linux, and the fact that you are currently on a
multi-user, multi-tasking system.
All commands in this section are executed on virtual terminal seven (the graphical login
prompt where you are logged in as yourself), using the terminal window you just opened,
unless specified otherwise.
__ 7. Change your password. Memorize this password because no one can find out your
password if you forget it.
__ 8. Display the system's date.
__ 9. Display the whole calendar for the year 2004.
__ 10. Display the month of January for the year 1999 and 99. Are 1999 and 99 the same?
__ 11. Generate a list of all users present on your system.
__ 12. Display your login name.
__ 13. Display the login information of your own user account, and of root.
__ 14. Clear your screen.
Locking terminals
Note: Not all distributions install vlock and xlock by default. If vlock and xlock are not
installed, then you will learn how to do that in Exercise 15 - Basic System Configuration.
__ 27. Lock a virtual terminal. Can you switch to another virtual terminal while this one is
locked? Unlock the terminal.
__ 28. Lock the console. Can you switch to another virtual terminal now? Unlock the
console.
© Copyright IBM Corp. 2001, 2004 Exercise 3. Using the System 3-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Logging off
__ 30. Log off all users that are logged in at any TTY.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 3. Using the System 3-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
» On a Fedora or Red Hat system, a terminal window can be started from the
“Red Hat” button in the lower left hand corner; System Tools; Terminal. You
can also drag this icon to your quick launch bar, if you want to.
» On a SuSE system, the terminal icon can be found in the launch bar.
Basic Commands
In this section we are going to execute some basic commands, in order to familiarize
yourself with the command syntax of Linux, and the fact that you are currently on a
multi-user, multi-tasking system.
All commands in this section are executed on virtual terminal seven (the graphical login
prompt where you are logged in as yourself), using the terminal window you just opened,
unless specified otherwise.
__ 7. Change your password. Memorize this password because no one can find out your
password if you forget it.
» $ passwd
» Changing password for <username>
» (current) UNIX password: (your current password)
» New UNIX password: (your new password)
» Retype new UNIX password: (your new password)
» passwd: all authentication tokens updated successfully.
__ 8. Display the system's date.
» $ date
__ 9. Display the whole calendar for the year 2004.
» $ cal 2004
__ 10. Display the month of January for the year 1999 and 99. Are 1999 and 99 the same?
» $ cal 1 1999
» $ cal 1 99
__ 11. Generate a list of all users present on your system.
» $ who
- OR -
» $ finger
__ 12. Display your login name.
» $ whoami
- OR -
» $ who am i
__ 13. Display the login information of your own user account, and of root.
» $ finger <username>
© Copyright IBM Corp. 2001, 2004 Exercise 3. Using the System 3-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
__ 22. Both in a text terminal and an emulated terminal in the graphical desktop, try to
re-execute commands by scrolling up a little, selecting the command with the left
mouse button, and then pasting it onto the same terminal again with the middle
mouse button.
Also try this across different text and graphical terminals.
Note: SuSE does not enable gpm by default, so your mouse won’t work in a text
terminal when you are using SuSE.
Locking terminals
Note: Not all distributions install vlock and xlock by default. If vlock and xlock are not
installed, then you will learn how to do that in Exercise 15 - Basic System Configuration.
__ 27. Lock a virtual terminal. Can you switch to another virtual terminal while this one is
locked? Unlock the terminal.
» <Ctrl-Alt-F1>
» $ vlock
» <Alt-F2>
» <Alt-F1>
» Type your password or the root password ibmlnx to unlock the terminal
__ 28. Lock the console. Can you switch to another virtual terminal now? Unlock the
console.
» $ vlock -a
» <Alt-F2>
» Type your password or the root password ibmlnx to unlock the console.
__ 29. Lock the graphical environment and then unlock it again.
» <Ctrl-Alt-F7>
» $ xlock
EXempty - OR -
Click on the padlock icon
- OR
Use the “Lock Screen” function in your “Start” menu.
» Type your password to unlock the graphical environment.
Logging off
__ 30. Log off all users that are logged in at any TTY.
» <Ctrl-Alt-F1>
» $ exit
» <Alt-F2>
» $ logout
» <Alt-F7>
» Click on the GNOME or KDE button and select “Log out”
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 3. Using the System 3-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
© Copyright IBM Corp. 2001, 2004 Exercise 4. Working with Files and Directories 4-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Working with directories
__ 1. If you are not logged in as yourself at tty7, log in now. Make sure you’ve got a
terminal window open.
__ 2. Check the directory you are placed in. What directory is this? __________
__ 3. Change your current directory to the root directory (/).
__ 4. Verify that you are in the root directory and then execute both a simple and a long
listing of the files in that directory.
__ 5. List all files in the current directory and list all files in the current directory and below.
Note: This command will provide extensive output. Once you have seen enough,
end the command with the correct <Ctrl> sequence.
__ 6. Return to your home directory and list its contents including hidden files.
__ 7. Create a directory in your home directory called mydir. Then, issue the command to
view a long listing of your home directory and the ~/mydir directory. (Do not show
the contents of the directories.) What is the size of each directory? __________
__ 8. Change to the mydir directory. Create two zero-length files called myfile1 and
myfile2.
__ 9. Issue the command to view a long listing of the contents of the mydir directory.
What are the sizes of myfile1 and myfile2?_______________
__ 10. Return to your home directory and use the ls -R command to view your directory
tree.
__ 11. Try to remove the mydir directory. Does it work?
__ 12. Go to the mydir directory once more and delete the two files in that directory. Then
go back up to your home directory and delete the mydir directory.
EXempty __ 18. Go to the sub2 directory and create a file called myfile.
__ 19. Go back to your home directory. Then make a copy of the whole sub1 directory tree
by the name of tree1. Make a recursive listing of all files and directories in sub1 and
tree1.
__ 20. You now have two directory trees, named sub1 and tree1. Move the directory tree
tree1 into the sub1 subdirectory.
__ 21. List the contents of your home directory. Make a recursive listing of all files and
directories in the sub1 directory.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 4. Working with Files and Directories 4-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
EXempty __ 8. Change to the mydir directory. Create two zero-length files called myfile1 and
myfile2.
» $ cd mydir
» $ touch myfile1
» $ touch myfile2
- OR -
$ touch myfile1 myfile2
__ 9. Issue the command to view a long listing of the contents of the mydir directory.
What are the sizes of myfile1 and myfile2?_______________
» $ ls -l
__ 10. Return to your home directory and use the ls -R command to view your directory
tree.
» $ cd
» $ ls -R
__ 11. Try to remove the mydir directory. Does it work?
» $ rmdir mydir
__ 12. Go to the mydir directory once more and delete the two files in that directory. Then
go back up to your home directory and delete the mydir directory.
» $ cd mydir
» $ rm myfile1 myfile2
» $ cd ..
» $ rmdir mydir
© Copyright IBM Corp. 2001, 2004 Exercise 4. Working with Files and Directories 4-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 5. File and Directory Permissions 5-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Creating User Accounts
In order to demonstrate permissions in full, we need to create a few additional users, tux1
and tux2, who both will be members of the penguins group. For this, you need to execute a
few command that have not been covered in the course, and which normally need not be
executed by a regular user. They are covered in full in the LX03.
__ 1. On tty3, log in as root
__ 2. Execute the following series of commands:
# groupadd penguins
# useradd -m -g penguins -c “Tux the Penguin (1)” tux1
# useradd -m -g penguins -c “Tux the Penguin (2)” tux2
# passwd tux1
New password: penguin1
Retype new password: penguin1
# passwd tux2
New password: penguin2
Retype new password: penguin2
__ 3. On tty1, log in as tux1 with password penguin1, and on tty2, log in as tux2 with
password penguin2.
EXempty __ 10. Set the permissions on my_ls to rw-r-----, then try to execute it, both as tux1 and
tux2. Does this work? Why not?
__ 11. Now set the permissions to rwxr-xr-x, then try to execute it once more, both as tux1
and tux2. Does this work now?
__ 12. Try to execute my_ls as tux1 and as tux2, and as yourself, but now with permissions
rw-------, rw-rw----, rwx------, rwx--x--- and rwx--x--x as well. What permissions are
required, at a minimum, for tux1 to execute my_ls? What permissions are required
for tux2? What permissions does your own user account require?
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 5. File and Directory Permissions 5-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
EXempty » $ ls /home/tux1
On a Fedora or Red Hat system, both command will fail, since the default
permissions on a users home directory are set to rwx------. On a SuSE system, both
command will succeed, since the default permissions are set to rwxr-xr-x.
__ 6. Fedora/Red Hat only: Switch to tty1. Change the permissions on the home
directory of tux1 so that other users are allowed to read and access it. Then try to
access the directory again as tux2. Does this work now?
» <Alt-F1>
» $ chmod 755 /home/tux1
- OR -
$ chmod go+rx /home/tux1
» <Alt-F2>
» $ cd /home/tux1
» $ ls /home/tux1
__ 7. As tux2, try to create and delete files in tux1s home directory. Does this work?
» $ touch testfile
__ 8. Switch once again to tty1. Create a “bin” directory and copy the file /bin/ls in there,
renaming it to my_ls in the process.
» <Alt-F1>
» $ mkdir /home/tux1/bin
» $ cp /bin/ls /home/tux1/bin/my_ls
__ 9. SuSE only: Log out and log in again. (SuSE only adds ~/bin to your path if it exists
when you log in.)
» $ logout
» Login: tux1
» Password: penguin1
__ 10. Set the permissions on my_ls to rw-r-----, then try to execute it, both as tux1 and
tux2. Does this work? Why not?
» $ chmod 640 /home/tux1/bin/my_ls
- OR -
$ chmod u=rw,g=r,o= /home/tux1/bin/my_ls
» $ my_ls
» <Alt-F2>
» $ /home/tux1/bin/my_ls
» <Alt-F1>
__ 11. Now set the permissions to rwxr-xr-x, then try to execute it once more, both as tux1
and tux2. Does this work now?
» $ chmod 755 /home/tux1/bin/my_ls
- OR -
© Copyright IBM Corp. 2001, 2004 Exercise 5. File and Directory Permissions 5-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
END OF EXERCISE
Exercise Instructions
Man Pages
__ 1. If you are not already logged on, log in as tux1 at tty1.
__ 2. Bring up the man pages for the man command. Read the text that follows to obtain
a better understanding of the functionality of the man command.
__ 3. Search for the string PAGER in the manual page of the man command.
__ 4. Use the <q> key to end the man command.
__ 5. Bring up the man page of the ls command. Move though the manual pages:
• Go to the last page
• Go to the previous page
• Go to the first page
Type these commands while looking at the man page of ls.
__ 6. Close the man command.
__ 7. Find out which manual pages all deal with passwd. Then view each page, giving the
correct section number.
Note: If the man -k or apropos commands do not work, then you need to run the
makewhatis command as root. Normally, the makewhatis command is executed
each night automatically, but since your system is freshly installed, this might not
have happened yet.
Info command
__ 8. View the info documentation for the finger command. Are you actually reading info
documentation now?
__ 9. Move through this page by using the <space> and <backspace> keys.
__ 10. Read the help for the info command. Use the <l> key to go back to the finger
information.
__ 11. End the info command.
__ 12. Read the info documentation of the info command. Use the menu by using the
<tab> and <m> keys.
__ 13. info has a nice built-in tutorial. If you have spare time during this course, look at the
tutorial to see some of the advanced features of info.
Other Documentation
EXempty __ 14. Make a listing of all directories in the /usr/share/doc directory. Browse some of these
directories to see what sort of information is available.
__ 15. If the classroom systems have an internet connection, then take a look at the
http://www.tldp.org Web site. This is the main documentation Web site for Linux.
Note that in some classrooms some additional configuration of your web browser
might be needed because the classroom is behind a socks or proxy based firewall.
In this case, your instructor will give you additional instructions.
END OF EXERCISE
Info command
EXempty __ 8. View the info documentation for the finger command. Are you actually reading info
documentation now?
» $ info finger
» No. Look at the upper left corner of your screen. It says *manpages*, which
means that there is no info documentation for finger. If info cannot locate the
correct info document, it will locate and display its manual page. If there is no
manual page, info will show the top node.
__ 9. Move through this page by using the <space> and <backspace> keys.
» <space> shows the next page of information
» <backspace> show the previous page
__ 10. Read the help for the info command. Use the <l> key to go back to the finger
information.
» To enter help type ?
» To quit the help type l.
__ 11. End the info command.
»q
__ 12. Read the info documentation of the info command. Use the menu by using the
<tab> and <m> keys.
» info info
» <tab>
» m
» <enter>
» q
__ 13. info has a nice built-in tutorial. If you have spare time during this course, look at the
tutorial to see some of the advanced features of info.
» Start the tutorial with the info command.
» $ info
»q
Other Documentation
__ 14. Make a listing of all directories in the /usr/share/doc directory. Browse some of these
directories to see what sort of information is available.
» $ cd /usr/share/doc
» $ ls
» Browse some directories and see what documentation is available.
» $ cd
__ 15. If the classroom systems have an internet connection, then take a look at the
http://www.tldp.org Web site. This is the main documentation Web site for Linux.
Note that in some classrooms some additional configuration of your web browser
might be needed because the classroom is behind a socks or proxy based firewall.
In this case, your instructor will give you additional instructions.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 7. A Tour through Linux 7-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Touring the Filesystem
__ 1. On tty3, log in as root again.
__ 2. Make a list of the directories which are present in the root of your filesystem. Now
perform steps 3 and 4 for each of these directories.
__ 3. Run the du command on each directory. The du command will display the amount of
disk space the directory and all its subdirectories use (in kilobytes). Which directory
contains the most data? Why?
__ 4. cd to each directory and list its contents. If there are important subdirectories, list
their contents too. However, don't get carried away by trying to list everything. Try to
figure out what kind of files you will find in that directory.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 7. A Tour through Linux 7-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
END OF EXERCISE
Exercise Instructions
Working with vi
__ 1. If you aren't already logged in as tux1 at tty1, log in now.
__ 2. Ensure that you are in your home directory. Create a file in your home directory
named vitest using vi.
Type the following text and the marine alphabet into the vitest file. Adding the
alphabet is an easy way to fill a couple of screens of information needed for later
use. This is a training session about the usage of the vi editor. We need some more
lines to learn the most common commands of the editor.
a alpha
b bravo
c charlie
…
(the rest of the marine alphabet)
x x-ray
y yankee
z zulu
__ 3. Return to command mode. Write and quit the file. Notice that as soon as you press
the colon (:), it appears below the last line of your input area. Once the buffer is
empty and the file is closed, you will see a message giving the number of lines and
characters in the file.
EXempty __ 8. Practice some more with all the commands that are listed on your cheat sheet.
__ 9. Save the file but do not exit vi.
END OF EXERCISE
END OF EXERCISE
Exercise Instructions
Wildcards
__ 1. If you are not logged in as tux1 at tty1, log in now.
__ 2. Go to the /etc directory and make a list of all files here.
__ 3. Use ls with wildcards to list file names:
• That end with conf
• That begin with a d or D
• That contain an o in the fifth position
• That contain the word tab (in any combination with capitals and lowercase
characters)
• That end with a number
• That do not end with a number
(Note that wildcard expansion is done by the shell. If one of the filenames that
matches is a directory name, then ls will by default list the contents of that
directory, instead of the filename itself. To prevent this, use the -d option.)
__ 4. What will happen if you execute the command ls -d ?[!y]*[e-f]? What would the
shortest filename be that can match? Execute this command to verify your answer.
__ 5. Return to your home directory.
Redirection
__ 6. Use the cat command and redirection to create a file called junk containing a few
lines of text. When you have typed a few lines, end your input to the cat command
and return to the shell prompt. Then view the contents of the file you just created.
__ 7. Append more lines to the junk file using redirection. Then view the contents of the
file junk and check if all the lines you saved in this file are there.
EXempty __ 12. Use the awk command to display the first and ninth column of the output of the ls -l
/etc/ command.
__ 13. Use the tac command to display the output of the ls command in reverse order.
__ 14. Use the nl command to number the lines of tempfile.
__ 15. Use the pr command to format tempfile for the printer.
__ 16. Combine all usersfile parts from exercise 4 into one big file, called usersfile5. Check
to see if this file is identical to the original usersfile.
Command Grouping
__ 17. On the same command line, display the current system date and all the users that
are logged in, together with some explaining comments, and save all this to one file
after numbering the lines. Check your output.
Process Environment
__ 18. Display all your variables that are defined in your current process environment. Also
display all variables that are currently exported.
__ 19. Create a variable x and set its value to 10. Check the value of the variable. Again,
display all your current variables.
__ 20. Create a subshell. Check to see what value variable x holds in the subshell. What is
the value of x? _______ List the subshell's current variables. Do you see a listing for
x? _______
__ 21. Set the value of x to 500 and go back to your parent process. What is the current
value of x? _______ Why?_______
__ 22. Make sure that child processes inherit the variable x. Verify this by creating a
subshell and checking the value of variable x. After this, exit your subshell.
END OF EXERCISE
Redirection
__ 6. Use the cat command and redirection to create a file called junk containing a few
lines of text. When you have typed a few lines, end your input to the cat command
and return to the shell prompt. Then view the contents of the file you just created.
» $ cat > junk
__ 16. Combine all usersfile parts from exercise 4 into one big file, called usersfile5. Check
to see if this file is identical to the original usersfile.
» $ cat usersfile.* > usersfile5
» $ diff usersfile usersfile5
Command Grouping
__ 17. On the same command line, display the current system date and all the users that
are logged in, together with some explaining comments, and save all this to one file
after numbering the lines. Check your output.
» $ ( date ; who ) | nl > users
» $ cat users
Process Environment
__ 18. Display all your variables that are defined in your current process environment. Also
display all variables that are currently exported.
» $ set | less
» $ env | less
__ 19. Create a variable x and set its value to 10. Check the value of the variable. Again,
display all your current variables.
» $ x=10
» $ echo $x
» $ set | less
» $ env | less
__ 20. Create a subshell. Check to see what value variable x holds in the subshell. What is
the value of x? _______ List the subshell's current variables. Do you see a listing for
x? _______
» $ bash
» $ echo $x
» You should see no output, only an empty line.
» $ set | less
» You should not see a listing for x.
__ 21. Set the value of x to 500 and go back to your parent process. What is the current
value of x? _______ Why?_______
» $ x=500
» $ exit
» $ echo $x
__ 22. Make sure that child processes inherit the variable x. Verify this by creating a
subshell and checking the value of variable x. After this, exit your subshell.
EXempty » $ export x
» $ env | less
» $ bash
» $ echo $x
» $ exit
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 10. Working with Processes 10-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Listing Processes
__ 1. Log in at tty1 as tux1.
__ 2. Check the pid of your log in environment and then create a subshell by entering
bash. What is the process ID of the subshell? Is it different from your login process?
____________________________________________________________
____________________________________________________________
__ 3. Enter the command ls -R / >outfile 2>/dev/null & and then show the processes that
you are running in the system. Which processes are running?
Note: This command will be explained in full in the next units.
____________________________________________________________
____________________________________________________________
__ 4. While the ls command is still running, run the pstree command. (It might be
necessary to restart the ls command.)
__ 5. Log in as tux2 on tty2 and run vi tux2_file.
__ 6. Go back to tty1 and show all the processes in your system. If necessary, look in the
man pages and info to find the correct options to show all processes running in your
system.
Look for your own processes as well as the processes of tux2.
__ 7. Again run the ls -R / >outfile 2>/dev/null & command and then exit your current
process. List the processes you are running. What happens to processes if you kill
their parent process?
____________________________________________________________
Job Control
__ 8. Using vi or another editor, create the file named myclock in your bin directory with
the following contents:
while true
do
date
sleep 10
done
Make the script executable.
__ 9. Run the script myclock. Run this script in the foreground.
__ 10. Suspend the job you just started.
EXempty __ 11. List all the jobs that you are running on the system and restart the above job in the
background.
__ 12. List all users that are logged in. Bring the job back to the foreground, wait until you
get a timestamp, and then exit the job.
Terminating a Process
__ 13. Execute the myclock script again, this time in the background.
__ 14. List all your processes and kill the sleep process. What happened?
__ 15. Now stop the shell script myclock.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 10. Working with Processes 10-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
EXempty » <Alt-F1>
» $ ps -aux | less
__ 7. Again run the ls -R / >outfile 2>/dev/null & command and then exit your current
process. List the processes you are running. What happens to processes if you kill
their parent process?
____________________________________________________________
» $ ls -R / >outfile 2>/dev/null &
» $ exit
» $ ps -aux
» $ pstree
» If the parent process dies, the child processes are transferred to a new parent
process, init.
Job Control
__ 8. Using vi or another editor, create the file named myclock in your bin directory with
the following contents:
while true
do
date
sleep 10
done
Make the script executable.
» $ cd ~/bin
» $ vi myclock
» $ chmod +x myclock
__ 9. Run the script myclock. Run this script in the foreground.
» $ myclock
__ 10. Suspend the job you just started.
» <Ctrl-Z>
__ 11. List all the jobs that you are running on the system and restart the above job in the
background.
» $ jobs
» $ bg %1
__ 12. List all users that are logged in. Bring the job back to the foreground, wait until you
get a timestamp, and then exit the job.
» $ who
» $ fg %1
» <Ctrl-C>
© Copyright IBM Corp. 2001, 2004 Exercise 10. Working with Processes 10-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Terminating a Process
__ 13. Execute the myclock script again, this time in the background.
» $ myclock &
__ 14. List all your processes and kill the sleep process. What happened?
» $ ps
» $ kill <PID>
Where <PID> is the process ID of the sleep command.
» You received a new timestamp immediately after the kill command ran.
» myclock is a shell script that displays a timestamp every 10 seconds. When
you kill the sleep process, there is no process to wait for. The script will
continue and show you another timestamp.
» Killing processes started from a shell script will not kill the shell script itself.
__ 15. Now stop the shell script myclock.
» $ kill <PID>
Where PID is the process ID of the process that runs the myclock script.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 11. Linux Utilities 11-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Working with find and locate
__ 1. Log in as tux1 at tty1, if you aren't already.
__ 2. Find and display all files and directories in your home directory.
__ 3. Find all files in your system that begin with the string abc and have ls -l
automatically executed on each file name found. Discard all errors.
__ 4. Repeat the previous command but interactively prompt the user to display the long
listing on each file. Do not discard errors, since stderr is used to display the prompt.
__ 5. Find all files starting from /usr that are owned by the user lp.
__ 6. Modify the last command to count the number of files on the whole system owned by
lp. Now alter the command so that you don't get error messages on your screen.
__ 7. Find all directories in your system and save this list in the file all.directories. The
error message can be sent to the bit bucket. Execute this command in the
background.
__ 8. Fedora/Red Hat only: Use the locate command to locate all files that match the
string “passwd”.
Note: SuSE does not install the locate command by default. You will learn how to do
this in Exercise 15 - Basic System Configuration
EXempty __ 17. Display the contents of /etc/passwd again, but now sorted on the home directory
field.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 11. Linux Utilities 11-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
EXempty __ 10. Only show the user name and the home directory of the users listed in /etc/passwd.
» $ cut -f1,6 -d: /etc/passwd
__ 11. Show the name and the members of all groups listed in /etc/group.
» $ cut -f1,4 -d: /etc/group
__ 12. List only the type, size and name of files in the current directory.
» $ ls -l | cut -c1-1,31-42,56-
© Copyright IBM Corp. 2001, 2004 Exercise 11. Linux Utilities 11-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
END OF EXERCISE
Introduction
You need no programming experience to perform this exercise. Refer
to the unit in the Student Notebook for help with the syntax of
constructs when creating the shell scripts in this exercise.
© Copyright IBM Corp. 2001, 2004 Exercise 12. Shell Scripting 12-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Working with Positional Parameters
__ 1. If you are not logged in as tux1 at tty1, log in now.
__ 2. Create a shell script named parameters that will echo the five parameters that
follow using predefined special variables set by the shell to fill in the blanks. Execute
the script using the positional parameters 10 100 1000.
Conditional Execution
__ 3. Using conditional execution, create a shell script named checkfile that will check to
see if the file named parameters exists in your directory. If it exists, use a command
to show the contents of the file. Execute the script.
__ 4. Modify the checkfile script and change the name of the file from parameters to
noname (check to ensure that you do NOT have a file by this name in your current
directory). Also, using conditional execution, if the ls command was NOT
successful, display the error message, “The file was not found”. Execute the script.
__ 5. Modify the checkfile script to accept a single parameter from the command line as
input to the ls and cat commands. Execute the script twice, once using the file
named parameters and again using the file named noname.
__ 6. Execute the checkfile script again, but this time with no parameters. What
happens? Modify the script so that this does not appear again.
Loops
__ 7. Using the for loop, modify the checkfile script to accept multiple files as input from
the command line instead of just one. If the files are found, display all of them. If the
files are not found, display an error message showing all file names that were not
found. Look in your directory and note a few valid file names that you can use as
input. Execute the script using valid and invalid file names.
__ 8. Now do the same thing, but use a while loop in combination with the shift
command.
Arithmetic
__ 9. From the command line, display the results of multiplying 5 times 6.
__ 10. Now create a shell script named math to multiply any two numbers when entered as
input from the command line. Execute the script multiplying 5 times 6. Experiment
with any other two numbers.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 12. Shell Scripting 12-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Conditional Execution
__ 3. Using conditional execution, create a shell script named checkfile that will check to
see if the file named parameters exists in your directory. If it exists, use a command
to show the contents of the file. Execute the script.
» $ vi checkfile
[ -f parameters ] && cat parameters
» $ chmod +x checkfile
» $ ./checkfile
__ 4. Modify the checkfile script and change the name of the file from parameters to
noname (check to ensure that you do NOT have a file by this name in your current
directory). Also, using conditional execution, if the ls command was NOT
successful, display the error message, “The file was not found”. Execute the script.
» $ vi checkfile
[ -f nofile ] && cat nofile || echo "The file was not found"
» $ ./checkfile
__ 5. Modify the checkfile script to accept a single parameter from the command line as
input to the ls and cat commands. Execute the script twice, once using the file
named parameters and again using the file named noname.
» $ vi checkfile
[ -f $1 ] && cat $1 || echo $1 was not found
» $ ./checkfile parameters
Loops
__ 7. Using the for loop, modify the checkfile script to accept multiple files as input from
the command line instead of just one. If the files are found, display all of them. If the
files are not found, display an error message showing all file names that were not
found. Look in your directory and note a few valid file names that you can use as
input. Execute the script using valid and invalid file names.
» $ vi checkfile
for x in $*
do
[ -f "$x" ] && cat "$x" || echo "$x was not found"
done
» $ ls
» $ ./checkfile filename filename filename
(Where filename is replaced by valid and invalid file names from your
directory)
__ 8. Now do the same thing, but use a while loop in combination with the shift
command.
» $ vi checkfile
while [ ! -z "$1" ]
do
[ -f "$1" ] && cat "$1" || echo "$1 was not found"
shift
done
Arithmetic
__ 9. From the command line, display the results of multiplying 5 times 6.
» $ echo $(( 5 * 6 ))
__ 10. Now create a shell script named math to multiply any two numbers when entered as
input from the command line. Execute the script multiplying 5 times 6. Experiment
with any other two numbers.
© Copyright IBM Corp. 2001, 2004 Exercise 12. Shell Scripting 12-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
» $ vi math
echo $(( $1 * $2 ))
» $ chmod +x math
» $ ./math 5 6
Integration Exercise
__ 11. Use the knowledge you gained in this course to write a script that will accept a
directory name as a parameter and calculate the total size of the files in this
directory.
» $ vi sum
if [ -d "$1" ]
then
sum=0
for i in $(ls -l "$1" | cut -c32-42)
do
sum=`expr "$sum" + "$i"`
done
echo "The total size of files in $1 is $sum."
fi
» $ ./sum /tmp
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 13. The Linux GUI 13-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Starting the GUI
__ 1. Log in as root on tty4.
__ 2. Edit the /etc/inittab file and make sure the default runlevel is 3.
__ 3. Reboot your system. Does the graphical environment get started?
__ 4. Log in as tux1 on tty1 and start X with the startx command.
__ 5. End your X environment, then log out and log in as root.
__ 6. Edit the /etc/inittab file again and set the default runlevel to 5. Then reboot the
system again. Did the graphical environment start?
Text editor(s)
Internet dialer
Email client
Web browser
CD Player
EXempty
MP3 Player
Sound mixer
Word processor
Spreadsheet
Presentation package
Photo/bitmap editor
__ 9. In both desktop environments, explore the themes capabilities. After setting a theme
in KDE, start a GNOME application, and vice versa. Does this work?
__ 10. In KDE, try to start a GNOME application and vice versa. Does this work? Try to cut
and paste between KDE and GNOME applications. Does this work?
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 13. The Linux GUI 13-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
EXempty Browse around in both the GNOME and KDE desktop environments and try to
identify the name of the application that fulfills a certain function. (You can retrieve
the name of the application by opening a terminal window and executing the ps
command.) Some names have already been filled in as an example.
To switch between KDE and GNOME, use your display managers (login prompt)
menu.
Text editor(s)
Internet dialer
Email client
Web browser
CD Player
MP3 Player
Sound mixer
Word processor
Spreadsheet
Presentation package
Photo/bitmap editor
Vector oriented graphics
editor
Clipboard
__ 9. In both desktop environments, explore the themes capabilities. After setting a theme
in KDE, start a GNOME application, and vice versa. Does this work?
__ 10. In KDE, try to start a GNOME application and vice versa. Does this work? Try to cut
and paste between KDE and GNOME applications. Does this work?
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 13. The Linux GUI 13-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
© Copyright IBM Corp. 2001, 2004 Exercise 14. Customizing the User Environment 14-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Customizing the shell environment
__ 1. If you are not logged in, log in as tux1 at tty1.
__ 2. Change the appropriate file to change your environment each time you log in. Make
sure that you have the following functions when you log in:
• Change the primary prompt to show you the complete path of the current
directory.
• Display a message stating your login name and the date you logged in.
• Define an alias num that shows you how many users are logged in at that
moment.
• Set the variable cheese to gouda.
__ 3. Log out and log in again. Check if the functions you defined in step one are
activated.
• Does your prompt show complete path of the current directory? ________
• Did your message display? __________
• Can you use the num command? _________
• Is the variable cheese set to gouda? ________
__ 4. If all the questions above are answered with yes, continue with step 5; else try step
2 and 3 again to fix the problems.
__ 5. Start a subshell and answer the following questions.
• Does your prompt show the complete path of the current directory? _____
• Did your message display? __________
• Can you use the num command? _________
• Can you use the command history with vi? _________
• Is the variable cheese set to gouda? ________
__ 6. If the settings are also available in subshells, continue with step 9, otherwise
continue with step 7.
__ 7. Most settings, with the exception of system variables, only apply to the current
environment and are not passed to subshells (child processes). There is a
configuration file in your system that will make settings available in subprocesses
too. Which file is this? _________
__ 8. Edit the .bash_profile and .bashrc files so that the correct settings are in the
correct configuration file. What settings should be in .bash_profile and what
settings should be in .bashrc?
____________________________________________________________
Uempty ____________________________________________________________
__ 9. Log out and log in again and see if your settings are set in your login environment.
Also check if the settings are set in a subshell.
__ 10. In the previous steps, you altered configuration files and then logged out and in to
activate the new settings. What could you do to activate settings in an altered
customization file without logging out and in again?
__ 11. If you are not in your login shell, return there now.
__ 12. Remove the num alias from your environment without editing the .bashrc or
.bash_profile file. Then display the list of aliases currently set and try to execute the
num alias.
__ 13. Add the num alias to your environment and check if num is there again.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 14. Customizing the User Environment 14-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Uempty • Can you use the command history with vi? _________
• Is the variable cheese set to gouda? ________
» $ bash
» $ num
» $ echo $cheese
__ 6. If the settings are also available in subshells, continue with step 9, otherwise
continue with step 7.
__ 7. Most settings, with the exception of system variables, only apply to the current
environment and are not passed to subshells (child processes). There is a
configuration file in your system that will make settings available in subprocesses
too. Which file is this? _________
__ 8. Edit the .bash_profile and .bashrc files so that the correct settings are in the
correct configuration file. What settings should be in .bash_profile and what
settings should be in .bashrc?
____________________________________________________________
____________________________________________________________
» $ vi .bash_profile
PS1='$PWD $ '
cheese=gouda
export PS1 cheese (and any other variable already exported)
echo User $LOGNAME logged in at $(date)
» $ vi .bashrc
alias num="who | wc -l"
__ 9. Log out and log in again and see if your settings are set in your login environment.
Also check if the settings are set in a subshell.
» $ exit
» Login: tux1
» Password: penguin1
» $ num
» $ echo $cheese
» $ bash
» $ num
» $ echo $cheese
__ 10. In the previous steps, you altered configuration files and then logged out and in to
activate the new settings. What could you do to activate settings in an altered
customization file without logging out and in again?
» $ . .bash_profile
» $ . .bashrc
__ 11. If you are not in your login shell, return there now.
© Copyright IBM Corp. 2001, 2004 Exercise 14. Customizing the User Environment 14-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
» $ ps
» $ exit
__ 12. Remove the num alias from your environment without editing the .bashrc or
.bash_profile file. Then display the list of aliases currently set and try to execute the
num alias.
» $ unalias num
» $ alias
» $ num
__ 13. Add the num alias to your environment and check if num is there again.
» $ . .bashrc
» $ num
END OF EXERCISE
Required Materials
• A set of installation CDs for your distribution
© Copyright IBM Corp. 2001, 2004 Exercise 15. Basic System Configuration 15-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
The RPM Package Manager
__ 1. Log in as root in your graphical environment. Open a terminal window.
__ 2. Make a list of all packages that are installed on the system.
__ 3. List the information of the bash package.
__ 4. List all files in the bash package.
__ 5. List all the package files that are available on the distribution CD-ROMs or Network
Install Server.
__ 6. Remember the vlock command that we tried to use in exercise 3? We could not do
that exercise because vlock was not installed. Now that you know how to install an
RPM, install the vlock RPM, and try to perform that particular exercise once more.
Before you install the vlock RPM, list the information of the RPM, and list all files in
the RPM.
vlock is on Fedora Core 1 CD 3, Red Hat Enterprise Linux CD 2, and SuSE 9.0 CD
2.
__ 7. Verify that the application vlock is indeed installed by performing the exercises from
exercise 3.
__ 8. Uninstall vlock and verify that it indeed is no longer available.
EXempty __ 12. Browse the files where the network configuration for your system is stored.
__ 13. If the classroom uses DHCP to configure your network card, then take a look at the
current configuration with the ifconfig and route commands.
__ 14. Ask your instructor for permission to modify the current network settings. This is a
safety issue since a wrong network configuration may lead to problems for other
students - even students in other classrooms! If you obtained permission, start the
configuration tool that is appropriate for your distribution and configure static
networking, using the IP address, netmask and default gateway you saw in the
previous exercise.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 15. Basic System Configuration 15-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
© Copyright IBM Corp. 2001, 2004 Exercise 15. Basic System Configuration 15-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
» # xmms
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 16. Securing a Linux Workstation 16-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Figuring out which services have ports open
__ 1. Log in as root. If you log in using a graphical environment, open a terminal window.
__ 2. Make a list of all open ports on the system. Identify all ports that are in the “listen”
state.
__ 3. For each of the ports of the previous step, find out which PID opened that port. Then
find out what the process name is for that PID.
__ 4. Consult the manual page and the information of the RPM for that process and
determine whether you want that service running or not.
END OF EXERCISE
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 16. Securing a Linux Workstation 16-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Required Materials
• The NetBIOS name of a Windows server, and the name and
password of a user account/home directory on that server.
© Copyright IBM Corp. 2001, 2004 Exercise 17. Integrating Linux in a Windows Environment 17-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
Accessing Windows filesystems
Note: At the time of this writing, the Linux kernel was only able to mount an NTFS
filesystem read-only. Read-write support was under development, but far from reliable. As
a result of this, some distribution manufacturers decided not to include NTFS in the
precompiled distribution kernel at all. So if your partition type is NTFS, you might not be
able to mount it without a kernel recompile. Kernel compiles are beyond the scope of this
course.
At the time of this writing, Fedora and Red Hat do not include NTFS support in their
distribution, but SuSE does.
__ 1. Make a list of all partitions that exist on your system with the fdisk -l /dev/hda (IDE)
or fdisk -l /dev/sda (SCSI) command.
__ 2. List all filesystems that are currently mounted with the mount command. Compare
this list with the output of the previous command. This should give you a list of
Windows filesystems that are not mounted yet.
__ 3. Create mountpoints under /mnt for all Windows filesystems that you will want to
mount. Then mount these filesystems manually, using the mount command. Verify
that the filesystem was indeed mounted and list the contents of the filesystem.
__ 4. Add a line to the /etc/fstab file so that this filesystem is mounted automatically when
the system boots, and reboot the system to verify that this worked.
__ 5. Ask your instructor for a blank floppy disk. Format this disk using the mformat
command. Try to access the floppy disk, both using the mtools and by mounting it.
WINE (optional)
Note: you can only perform this exercise if:
• You have a Microsoft Office CD, and a valid license for this product.
• You have a valid Codeweavers CrossOver Office license (a 30-day trial license can be
requested on the Web site)
We are using CrossOver Office because we’re not just running Microsoft Office, but
we’re installing it as well. CrossOver Office makes this process extremely easy although
it can be done without CrossOver Office.
Due to licensing issues, one or both of the conditions above might not have been satisfied
in class. In that case, you cannot perform this exercise.
__ 6. Go to the web page and download the CrossOver Office installation shell script as
instructed in the e-mail in which your license (either trial or commercial) was
delivered to you.
__ 7. As root, start the CrossOver Office installation shell script.
EXempty __ 8. As a regular user, start the CrossOver Setup Program (Start; CrossOver; Office
Setup). Work through the menus to install Microsoft Office.
__ 9. Start one of the MS Office applications using the Start; Windows Applications;
Programs menu.
Win4Lin (optional)
Note: You can only perform this exercise if:
• You have a valid Win4Lin license
• You have an MS-Windows 95/98/ME installation CD, and a valid license key
• You have a fairly fast internet connection: The Win4Lin installer downloads Win4Lin
over the internet during installation, and this may be a download of 20 MB, depending
on the distribution you use, and the options you choose.
Due to licensing issues, one or both of the first two conditions above might not have been
satisfied in class. In that case, you cannot perform this exercise.
__ 10. Check with your instructor to see whether he or she already downloaded the
Win4Lin installer, and what the license key is. Copy over or download the Win4Lin
installer to /root.
__ 11. Unpack the Win4Lin installer
__ 12. Start the Win4Lin installer
__ 13. Work through the screens of the Win4Lin installer. Provide the license information
when asked for, and reboot your system when a Win4Lin capable kernel has been
installed.
__ 14. Log in as root and start the Win4Lin installer again.
__ 15. When the system-wide installation has finished, log out and log in as yourself. Then
start the Win4Lin installer again.
__ 16. Work through the screens again. Eventually, a new windows will open in which the
Windows installer will run. This should be familiar... Enter the Windows license key
when required.
__ 17. Once the Windows install is finished, play with it. Also shut down Windows and try to
start it again. From a command prompt, this is done with the win command. In
certain distributions and desktop environments, a Win4Lin entry will also be added
to your start menu.
VMWare (optional)
Note: You can only perform this exercise if:
• You have a valid VMWare Workstation license, or obtained a demo (30-day) license
© Copyright IBM Corp. 2001, 2004 Exercise 17. Integrating Linux in a Windows Environment 17-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
EXempty OpenOffice
__ 28. Start OpenOffice and try to create and save various types of documents: text
documents, presentations, spreadsheets and so forth. Try to save them in
Microsoft-compatible formats.
__ 29. Start an internet browser and use Google to search for and obtain various
documents in Microsoft formats (search, for instance, for test.doc, test.ppt and
test.xls). See if you can open, modify and save these files.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 17. Integrating Linux in a Windows Environment 17-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
EXempty » # mdir a:
» fedora/redhat# mount /mnt/floppy
suse# mount /media/floppy
» # ls /mnt/floppy
» # cat /mnt/floppy
» fedora/redhat# umount /mnt/floppy
suse# umount /mnt/floppy
WINE (optional)
Note: you can only perform this exercise if:
• You have a Microsoft Office CD, and a valid license for this product.
• You have a valid Codeweavers CrossOver Office license (a 30-day trial license can be
requested on the Web site)
We are using CrossOver Office because we’re not just running Microsoft Office, but
we’re installing it as well. CrossOver Office makes this process extremely easy although
it can be done without CrossOver Office.
Due to licensing issues, one or both of the conditions above might not have been satisfied
in class. In that case, you cannot perform this exercise.
__ 6. Go to the web page and download the CrossOver Office installation shell script as
instructed in the e-mail in which your license (either trial or commercial) was
delivered to you.
__ 7. As root, start the CrossOver Office installation shell script.
» # ./install-crossover-office-version.sh
__ 8. As a regular user, start the CrossOver Setup Program (Start; CrossOver; Office
Setup). Work through the menus to install Microsoft Office.
__ 9. Start one of the MS Office applications using the Start; Windows Applications;
Programs menu.
Win4Lin (optional)
Note: You can only perform this exercise if:
• You have a valid Win4Lin license
• You have an MS-Windows 95/98/ME installation CD, and a valid license key
• You have a fairly fast internet connection: The Win4Lin installer downloads Win4Lin
over the internet during installation, and this may be a download of 20 MB, depending
on the distribution you use, and the options you choose.
Due to licensing issues, one or both of the first two conditions above might not have been
satisfied in class. In that case, you cannot perform this exercise.
© Copyright IBM Corp. 2001, 2004 Exercise 17. Integrating Linux in a Windows Environment 17-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
__ 10. Check with your instructor to see whether he or she already downloaded the
Win4Lin installer, and what the license key is. Copy over or download the Win4Lin
installer to /root.
__ 11. Unpack the Win4Lin installer
» # tar -zxvf netraverse_installer5.tgz
__ 12. Start the Win4Lin installer
» # cd netraverse_installer
» # ./win4lin-install
__ 13. Work through the screens of the Win4Lin installer. Provide the license information
when asked for, and reboot your system when a Win4Lin capable kernel has been
installed.
__ 14. Log in as root and start the Win4Lin installer again.
» # cd netraverse_installer
» # ./win4lin-install
__ 15. When the system-wide installation has finished, log out and log in as yourself. Then
start the Win4Lin installer again.
» $ win4lin-install
__ 16. Work through the screens again. Eventually, a new windows will open in which the
Windows installer will run. This should be familiar... Enter the Windows license key
when required.
__ 17. Once the Windows install is finished, play with it. Also shut down Windows and try to
start it again. From a command prompt, this is done with the win command. In
certain distributions and desktop environments, a Win4Lin entry will also be added
to your start menu.
VMWare (optional)
Note: You can only perform this exercise if:
• You have a valid VMWare Workstation license, or obtained a demo (30-day) license
• You have an MS-Windows installation CD, or a preinstalled MS-Windows VMWare
image available, and a valid license for MS-Windows.
Due to licensing issues, one or both of the conditions above might not have been satisfied
in class. In that case, you cannot perform this exercise.
__ 18. Check with your instructor if the VMWare license, the VMWare RPM and the
Windows CD or images are available, and what their location is.
__ 19. Download and install the VMWare RPM.
» # rpm -ivh VMware-Workstation-version.i386.rpm
EXempty __ 20. Run the VMWare configuration script and configure VMWare for your situation.
Usually, the defaults are OK.
» # vmware-config.pl
__ 21. If you have a VMWare license file, then create the directory .vmware in your home
directory, and copy the license file into this directory. Alternatively, start vmware and
enter the license information in the Help; Enter Serial Number popup screen.
» # cd
» # mkdir .vmware
» # cp /somewhere/license.ws.version .vmware/
__ 22. If your instructor has a preinstalled Windows VMWare image available, then unpack
this image. Start VMWare, open the image configuration file (*.vmx) and start the
virtual machine.
__ 23. If your instructor has a Windows CD available, then start VMWare, create a new
virtual machine with the New Virtual Machine Wizard. Insert the CD and start the
virtual machine.
© Copyright IBM Corp. 2001, 2004 Exercise 17. Integrating Linux in a Windows Environment 17-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
OpenOffice
__ 28. Start OpenOffice and try to create and save various types of documents: text
documents, presentations, spreadsheets and so forth. Try to save them in
Microsoft-compatible formats.
__ 29. Start an internet browser and use Google to search for and obtain various
documents in Microsoft formats (search, for instance, for test.doc, test.ppt and
test.xls). See if you can open, modify and save these files.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 18. End-of-course Challenge Exercise 18-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
Exercise Instructions
You have decided to start using Linux on your home PC, and you have convinced the other
members of your family (who also use this PC) to give it a try as well. They are not
convinced that they want to get rid of the current MS-Windows installation though.
Together with your family members you have created a list of requirements regarding the
Linux installation:
1. The PC should have a dual-boot installation, where a boot menu allows you to boot the
current, MS-Windows OS, and the new Linux installation. The default OS should be
Linux.
2. The partitioning scheme should include the current Windows partition, a /boot partition,
a / partition, a swap partition and a data partition. The data partition should be a FAT
filesystem, so that it is accessible from Windows as D:-drive, and should be mounted
under Linux as /mnt/data. The mount permissions of /mnt/data should be set so that
everybody can access all files. (Note that a FAT filesystem does not support
permissions, so you will have to work with mount options to achieve this. Consult the
manual page of mount for the correct options.)
3. When Linux boots, it should come up with a graphical login prompt. Because of disk
space considerations, only install KDE, not GNOME.
4. Each member of your family should have its own user account. You should create these
user accounts, and set the password identical to the username. Your family members
will change their passwords later. Obviously, you should also create a user account for
yourself.
5. All unnecessary services should be switched off. For all services that are running, go to
your distributions Web site and download and install all available updates.
6. The relevant parts of the documentation that came with your distribution should be
copied to disk, in a suitable location.
7. The household printer (if available) should be configured.
8. The sound card (if available) should be configured.
9. The network adapter (if available) should be configured with a dynamic (DHCP) IP
address.
10. Your youngest daughter is two years old and has problems with her hand-eye
coordination. When she logs in (with help), she should find a desktop full of simple
applications that help her train her hand-eye coordination, such as xeyes, xbill and
SameGnome.
11. In order to maintain the system, you need two shell scripts, which should be executable
by root only:
• A script which checks all filesystems (including the Windows and the data
filesystem), and warns you if the utilization of one of them gets above 90%.
EXempty • A script which prints the amount of data in each users home directory, sorted
by disk usage.
Implement all requirements listed above as well as possible, using your student guide and
any documentation you can find as a reference. A few requirements are not fully covered in
the course. In this case, use the manual pages and other documentation to find out the
correct commands and/or options.
There are no hints for this exercise, but you can consult your instructor if you have
problems fulfilling a requirement.
END OF EXERCISE
© Copyright IBM Corp. 2001, 2004 Exercise 18. End-of-course Challenge Exercise 18-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Exercises
backpg
Back page
®