Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 330 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
330
Dung lượng
3,06 MB
Nội dung
LINUX:Rute User’s Tutorialand Exposition
Paul Sheer
August 14, 2001
Pages up to and including this page are not included by Prentice Hall.
2
“The reason we don’t sell billions and billions of Guides,” continued Harl,
after wiping his mouth, “is the expense. What we do is we sell one Guide billions
and billions of times. We exploit the multidimensional nature of the Universe to
cut down on manufacturing costs. And we don’t sell to penniless hitchhikers.
What a stupid notion that was! Find the one section of the market that, more or
less by definition, doesn’t have any money, and try to sell to it. No. We sell to
the affluent business traveler and his vacationing wife in a billion, billion different
futures. This is the most radical, dynamic and thrusting business venture in the
entire multidimensional infinity of space-time-probability ever.”
Ford was completely at a loss for what to do next.
“Look,” he said in a stern voice. But he wasn’t certain how far saying things
like “Look” in a stern voice was necessarily going to get him, and time was not on
his side. What the hell, he thought, you’re only young once, and threw himself out
of the window. That would at least keep the element of surprise on his side.
In a spirit of scientific inquiry he hurled himself out of the window again.
Douglas Adams
Mostly Harmless
Strangely, the thing that least intrigued me was how they’d managed to get it
all done. I suppose I sort of knew. If I’d learned one thing from traveling, it was
that the way to get things done was to go ahead and do them. Don’t talk about
going to Borneo. Book a ticket, get a visa, pack a bag, and it just happens.
Alex Garland
The Beach
vi
Chapter Summary
1 Introduction 1
2 Computing Sub-basics 5
3 PC Hardware 15
4 Basic Commands 25
5 Regular Expressions 49
6 Editing Text Files 53
7 Shell Scripting 61
8 Streams and sed — The Stream Editor 73
9 Processes, Environment Variables 81
10 Mail 97
11 User Accounts and Ownerships 101
12 Using Internet Services 111
13 L
INUX Resources 117
14 Permission and Modification Times 123
15 Symbolic and Hard Links 127
16 Pre-installed Documentation 131
17 Overview of the U
NIX Directory Layout 135
18 U
NIX Devices 141
19 Partitions, File Systems, Formatting, Mounting 153
20 Advanced Shell Scripting 171
21 System Services and lpd 193
22 Trivial Introduction to C 207
23 Shared Libraries 233
24 Source and Binary Packages 237
25 Introduction to IP 247
26 TCP and UDP 263
vii
Chapter Summary
27 DNS and Name Resolution 273
28 Network File System, NFS 285
29 Services Running Under inetd 291
30 exim and sendmail 299
31 lilo, initrd, and Booting 317
32 init, ?getty, and U
NIX Run Levels 325
33 Sending Faxes 333
34 uucp and uux 337
35 The LINUX File System Standard 347
36 httpd — Apache Web Server 389
37 crond and atd 409
38 postgres SQL Server 413
39 smbd — Samba NT Server 425
40 named — Domain Name Server 437
41 Point-to-Point Protocol — Dialup Networking 453
42 The L
INUX Kernel Source, Modules, and Hardware Support 463
43 The X Window System 485
44 UNIX Security 511
A Lecture Schedule 525
B LPI Certification Cross-Reference 531
C RHCE Certification Cross-Reference 543
DL
INUX Advocacy FAQ 551
E The GNU General Public License Version 2 573
Index 581
viii
Contents
Acknowledgments xxxi
1 Introduction 1
1.1 What This Book Covers 1
1.2 Read This Next. . . 1
1.3 What Do I Need to Get Started? 1
1.4 MoreAboutThisBook 2
1.5 I Get Frustrated with U
NIX Documentation That I Don’t Understand . . 2
1.6 LPI and RHCE Requirements 2
1.7 Not RedHat: RedHat-like 3
1.8 Updates and Errata 3
2 Computing Sub-basics 5
2.1 Binary, Octal, Decimal, and Hexadecimal 5
2.2 Files 7
2.3 Commands 8
2.4 Login and Password Change 9
2.5 Listing Files 10
2.6 Command-Line Editing Keys 10
2.7 ConsoleKeys 11
2.8 Creating Files 12
2.9 Allowable Characters for File Names 12
2.10 Directories 12
3 PC Hardware 15
3.1 Motherboard 15
3.2 Master/Slave IDE 19
ix
Contents
3.3 CMOS 20
3.4 Serial Devices 20
3.5 Modems 23
4 Basic Commands 25
4.1 The ls Command, Hidden Files, Command-Line Options 25
4.2 Error Messages 26
4.3 Wildcards, Names, Extensions, and glob Expressions 29
4.3.1 File naming 29
4.3.2 Glob expressions 32
4.4 Usage Summaries and the Copy Command 33
4.5 Directory Manipulation 34
4.6 Relative vs. Absolute Pathnames . 34
4.7 System Manual Pages 35
4.8 System info Pages 36
4.9 Some Basic Commands 36
4.10 The mc File Manager 40
4.11 Multimedia Commands for Fun 40
4.12 Terminating Commands 41
4.13 Compressed Files 41
4.14 Searching for Files 42
4.15 Searching Within Files 43
4.16 Copying to MS-DOS and Windows Formatted Floppy Disks 44
4.17 Archives and Backups 45
4.18 The PATH Where Commands Are Searched For 46
4.19 The Option 47
5 Regular Expressions 49
5.1 Overview 49
5.2 The fgrep Command 51
5.3 Regular Expression \{ \} Notation 51
5.4 + ? \< \> ( ) | Notation 52
5.5 Regular Expression Subexpressions 52
x
Contents
6 Editing Text Files 53
6.1 vi 53
6.2 Syntax Highlighting 57
6.3 Editors 57
6.3.1 Cooledit 58
6.3.2 vi and vim 58
6.3.3 Emacs 59
6.3.4 Other editors 59
7 Shell Scripting 61
7.1 Introduction 61
7.2 Looping: the while and until Statements 62
7.3 Looping: the for Statement 63
7.4 breaking Out of Loops and continueing 65
7.5 Looping Over Glob Expressions 66
7.6 The case Statement 66
7.7 Using Functions: the function Keyword 67
7.8 Properly Processing Command-Line Args: shift 68
7.9 More on Command-Line Arguments: $@ and $0 70
7.10 Single Forward Quote Notation 70
7.11 Double-Quote Notation 70
7.12 Backward-Quote Substitution 71
8 Streams and sed — The Stream Editor 73
8.1 Introduction 73
8.2 Tutorial 74
8.3 Piping Using | Notation 74
8.4 A Complex Piping Example 75
8.5 Redirecting Streams with >& 75
8.6 Using sed to Edit Streams 77
8.7 Regular Expression Subexpressions 77
8.8 Inserting and Deleting Lines 79
9 Processes, Environment Variables 81
9.1 Introduction 81
9.2 ps — List Running Processes 82
9.3 Controlling Jobs 82
xi
Contents
9.4 Creating Background Processes 83
9.5 killing a Process, Sending Signals 84
9.6 List of Common Signals 86
9.7 Niceness of Processes, Scheduling Priority 87
9.8 Process CPU/Memory Consumption, top 88
9.9 Environments of Processes 90
10 Mail 97
10.1 Sending and Reading Mail 99
10.2 The SMTP Protocol — Sending Mail Raw to Port 25 99
11 User Accounts and Ownerships 101
11.1 File Ownerships 101
11.2 The Password File /etc/passwd 102
11.3 Shadow Password File: /etc/shadow 103
11.4 The groups Command and /etc/group 104
11.5 Manually Creating a User Account 105
11.6 Automatically: useradd and groupadd 106
11.7 User Logins 106
11.7.1 The login command 106
11.7.2 The set user, su command 107
11.7.3 The who, w, andusers commands to see who is logged in 108
11.7.4 The id command and effective UID 109
11.7.5 User limits 109
12 Using Internet Services 111
12.1 ssh, not telnet or rlogin 111
12.2 rcp and scp 112
12.3 rsh 112
12.4 FTP 113
12.5 finger 114
12.6 Sending Files by Email 114
12.6.1 uuencode and uudecode 114
12.6.2 MIME encapsulation 115
xii
Contents
13 LINUX Resources 117
13.1 FTP Sites and the sunsite Mirror 117
13.2 HTTP — Web Sites 118
13.3 SourceForge 119
13.4 Mailing Lists 119
13.4.1 Majordomo and Listserv 119
13.4.2 *-request 120
13.5 Newsgroups 120
13.6 RFCs 121
14 Permission and Modification Times 123
14.1 The chmod Command 123
14.2 The umask Command 125
14.3 Modification Times: stat 126
15 Symbolic and Hard Links 127
15.1 Soft Links 127
15.2 Hard Links 129
16 Pre-installed Documentation 131
17 Overview of the U
NIX Directory Layout 135
17.1 Packages 135
17.2 U
NIX Directory Superstructure . . . 136
17.3 L
INUX on a Single Floppy Disk 138
18 U
NIX Devices 141
18.1 Device Files 141
18.2 Block and Character Devices 142
18.3 Major and Minor Device Numbers 143
18.4 Common Device Names 143
18.5 dd, tar, and Tricks with Block Devices 147
18.5.1 Creating boot disks from boot images 147
18.5.2 Erasing disks 147
18.5.3 Identifying data on raw disks 148
18.5.4 Duplicating a disk 148
18.5.5 Backing up to floppies 149
xiii
Contents
18.5.6 Tape backups 149
18.5.7 Hiding program output, creating blocks of zeros 149
18.6 Creating Devices with mknod and /dev/MAKEDEV 150
19 Partitions, File Systems, Formatting, Mounting 153
19.1 The Physical Disk Structure 153
19.1.1 Cylinders, heads, and sectors 153
19.1.2 Large Block Addressing 154
19.1.3 Extended partitions 154
19.2 Partitioning a New Disk 155
19.3 Formatting Devices 160
19.3.1 File systems 160
19.3.2 mke2fs 160
19.3.3 Formatting floppies and removable drives 161
19.3.4 Creating MS-DOS floppies 162
19.3.5 mkswap, swapon, and swapoff 162
19.4 Device Mounting 163
19.4.1 Mounting CD-ROMs 163
19.4.2 Mounting floppy disks 164
19.4.3 Mounting Windows and NT partitions 164
19.5 File System Repair: fsck 165
19.6 File System Errors on Boot 165
19.7 Automatic Mounts: fstab 166
19.8 Manually Mounting /proc 167
19.9 RAM and Loopback Devices 167
19.9.1 Formatting a floppy inside a file 167
19.9.2 CD-ROM files 168
19.10 Remounting 168
19.11 Disk sync 169
20 Advanced Shell Scripting 171
20.1 Lists of Commands 171
20.2 Special Parameters: $?, $*, 172
20.3 Expansion 173
20.4 Built-in Commands 175
20.5 Trapping Signals — the trap Command 176
xiv
Contents
20.6 Internal Settings — the set Command 177
20.7 Useful Scripts and Commands 178
20.7.1 chroot 178
20.7.2 if conditionals 179
20.7.3 patching and diffing 179
20.7.4 Internet connectivity test 180
20.7.5 Recursive grep (search) 180
20.7.6 Recursive search and replace 181
20.7.7 cut and awk — manipulating text file fields 182
20.7.8 Calculations with bc 183
20.7.9 Conversion of graphics formats of many files 183
20.7.10 Securely erasing files 184
20.7.11 Persistent background processes 184
20.7.12 Processing the process list 185
20.8 Shell Initialization 186
20.8.1 Customizing the PATH and LD
LIBRARY PATH 187
20.9 File Locking 187
20.9.1 Locking a mailbox file 188
20.9.2 Locking over NFS 190
20.9.3 Directory versus file locking 190
20.9.4 Locking inside C programs 191
21 System Services and lpd 193
21.1 Using lpr 193
21.2 Downloading and Installing 194
21.3 LPRng vs. Legacy lpr-0.nn 195
21.4 Package Elements 195
21.4.1 Documentation files 195
21.4.2 Web pages, mailing lists, and download points 195
21.4.3 User programs 196
21.4.4 Daemon and administrator programs 196
21.4.5 Configuration files 196
21.4.6 Service initialization files 196
21.4.7 Spool files 197
21.4.8 Log files 198
21.4.9 Log file rotation 198
xv
Contents
21.4.10 Environment variables 199
21.5 The printcap File in Detail 199
21.6 PostScript and the Print Filter 200
21.7 Access Control 202
21.8 Printing Troubleshooting 203
21.9 Useful Programs 204
21.9.1 printtool 204
21.9.2 apsfilter 204
21.9.3 mpage 204
21.9.4 psutils 204
21.10 Printing to Things Besides Printers 205
22 Trivial Introduction to C 207
22.1 C Fundamentals 208
22.1.1 The simplest C program 208
22.1.2 Variables and types 209
22.1.3 Functions 210
22.1.4 for, while, if, and switch statements 211
22.1.5 Strings, arrays, and memory allocation 213
22.1.6 String operations 215
22.1.7 File operations 217
22.1.8 Reading command-line arguments inside C programs 218
22.1.9 A more complicated example 218
22.1.10 #include statements and prototypes 220
22.1.11 C comments 221
22.1.12 #define and #if — C macros 222
22.2 Debugging with gdb and strace 223
22.2.1 gdb 223
22.2.2 Examining core files 227
22.2.3 strace 227
22.3 C Libraries 227
22.4 C Projects — Makefiles 230
22.4.1 Completing our example Makefile 231
22.4.2 Putting it all together 231
xvi
Contents
23 Shared Libraries 233
23.1 Creating DLL .so Files 233
23.2 DLL Versioning 234
23.3 Installing DLL .so Files 235
24 Source and Binary Packages 237
24.1 Building GNU Source Packages 237
24.2 RedHat and Debian Binary Packages 240
24.2.1 Package versioning 240
24.2.2 Installing, upgrading, and deleting 240
24.2.3 Dependencies 241
24.2.4 Package queries 241
24.2.5 File lists and file queries 242
24.2.6 Package verification 243
24.2.7 Special queries 244
24.2.8 dpkg/apt versus rpm 245
24.3 Source Packages 246
25 Introduction to IP 247
25.1 Internet Communication 247
25.2 Special IP Addresses 249
25.3 Network Masks and Addresses 250
25.4 Computers on a LAN 250
25.5 Configuring Interfaces 251
25.6 Configuring Routing 252
25.7 Configuring Startup Scripts 254
25.7.1 RedHat networking scripts 254
25.7.2 Debian networking scripts 255
25.8 Complex Routing — a Many-Hop Example 256
25.9 Interface Aliasing — Many IPs on One Physical Card 259
25.10 Diagnostic Utilities 260
25.10.1 ping 260
25.10.2 traceroute 261
25.10.3 tcpdump 261
xvii
Contents
26 TCP and UDP 263
26.1 The TCP Header 264
26.2 A Sample TCP Session 265
26.3 User Datagram Protocol (UDP) 268
26.4 /etc/services File 269
26.5 Encrypting and Forwarding TCP 270
27 DNS and Name Resolution 273
27.1 Top-Level Domains (TLDs) 273
27.2 Resolving DNS Names to IP Addresses 274
27.2.1 The Internet DNS infrastructure 275
27.2.2 The name resolution process 276
27.3 Configuring Your Local Machine 277
27.4 Reverse Lookups 281
27.5 Authoritative foraDomain 281
27.6 The host, ping, and whois Command 281
27.7 The nslookup Command 282
27.7.1 NS, MX, PTR, A and CNAME records 283
27.8 The dig Command 284
28 Network File System, NFS 285
28.1 Software 285
28.2 Configuration Example 286
28.3 Access Permissions 288
28.4 Security 289
28.5 Kernel NFS 289
29 Services Running Under inetd 291
29.1 The inetd Package . 291
29.2 Invoking Services with /etc/inetd.conf 291
29.2.1 Invoking a standalone service 292
29.2.2 Invoking an inetd service 292
29.2.3 Invoking an inetd “TCP wrapper” service 293
29.2.4 Distribution conventions 294
29.3 Various Service Explanations 294
29.4 The xinetd Alternative 295
29.5 Configuration Files 295
xviii
Contents
29.5.1 Limiting access 296
29.6 Security 297
30 exim and sendmail 299
30.1 Introduction 299
30.1.1 How mail works 299
30.1.2 Configuring a POP/IMAP server 301
30.1.3 Why exim? 301
30.2 exim Package Contents 301
30.3 exim Configuration File 302
30.3.1 Global settings 303
30.3.2 Transports 304
30.3.3 Directors 305
30.3.4 Routers 306
30.4 Full-blown Mail server 306
30.5 Shell Commands for exim Administration 308
30.6 The Queue 309
30.7 /etc/aliases for Equivalent Addresses 310
30.8 Real-Time Blocking List — Combating Spam 311
30.8.1 What is spam? 311
30.8.2 Basic spam prevention 312
30.8.3 Real-time blocking list 313
30.8.4 Mail administrator and user responsibilities 313
30.9 Sendmail 314
31 lilo, initrd, and Booting 317
31.1 Usage 317
31.2 Theory 318
31.2.1 Kernel boot sequence 318
31.2.2 Master boot record 318
31.2.3 Booting partitions 318
31.2.4 Limitations 319
31.3 lilo.conf and the lilo Command 319
31.4 Creating Boot Floppy Disks 321
31.5 SCSI Installation Complications and initrd 322
31.6 Creating an initrd Image 322
31.7 Modifying lilo.conf for initrd 324
31.8 Using mkinitrd 324
xix
Contents
32 init, ?getty, and UNIX Run Levels 325
32.1 init — the First Process 325
32.2 /etc/inittab 326
32.2.1 Minimal configuration 326
32.2.2 Rereading inittab 328
32.2.3 The respawning too fast error 328
32.3 Useful Run Levels 328
32.4 getty Invocation 329
32.5 Bootup Summary 329
32.6 Incoming Faxes and Modem Logins 330
32.6.1 mgetty with character terminals 330
32.6.2 mgetty log files 330
32.6.3 mgetty with modems 330
32.6.4 mgetty receiving faxes 331
33 Sending Faxes 333
33.1 Fax Through Printing 333
33.2 Setgid Wrapper Binary 335
34 uucp and uux 337
34.1 Command-Line Operation 338
34.2 Configuration 338
34.3 Modem Dial 341
34.4 tty/UUCP Lock Files 342
34.5 Debugging uucp 343
34.6 Using uux with exim 343
34.7 Scheduling Dialouts 346
35 The L
INUX File System Standard 347
35.1 Introduction 349
35.1.1 Purpose 349
35.1.2 Conventions 349
35.2 The Filesystem 349
35.3 The Root Filesystem 351
35.3.1 Purpose 351
35.3.2 Requirements 352
35.3.3 Specific Options 352
xx
Contents
35.3.4 /bin : Essential user command binaries (for use by all users) . . 353
35.3.5 /boot : Static files of the boot loader 354
35.3.6 /dev : Device files 355
35.3.7 /etc : Host-specific system configuration 355
35.3.8 /home : User home directories (optional) 358
35.3.9 /lib : Essential shared libraries and kernel modules 358
35.3.10 /lib<qual> : Alternate format essential shared libraries (optional)359
35.3.11 /mnt : Mount point for a temporarily mounted filesystem 359
35.3.12 /opt : Add-on application software packages 360
35.3.13 /root : Home directory for the root user (optional) 361
35.3.14 /sbin : System binaries 361
35.3.15 /tmp : Temporary files 362
35.4 The /usr Hierarchy 362
35.4.1 Purpose 362
35.4.2 Requirements 363
35.4.3 Specific Options 363
35.4.4 /usr/X11R6 : X Window System, Version 11 Release 6 (optional) 363
35.4.5 /usr/bin : Most user commands 364
35.4.6 /usr/include : Directory for standard include files. 365
35.4.7 /usr/lib : Libraries for programming and packages 365
35.4.8 /usr/lib<qual> : Alternate format libraries (optional) 366
35.4.9 /usr/local : Local hierarchy 366
35.4.10 /usr/sbin : Non-essential standard system binaries 367
35.4.11 /usr/share : Architecture-independent data 367
35.4.12 /usr/src : Source code (optional) 373
35.5 The /var Hierarchy 373
35.5.1 Purpose 373
35.5.2 Requirements 373
35.5.3 Specific Options 374
35.5.4 /var/account : Process accounting logs (optional) 374
35.5.5 /var/cache : Application cache data 374
35.5.6 /var/crash : System crash dumps (optional) 376
35.5.7 /var/games : Variable game data (optional) 376
35.5.8 /var/lib : Variable state information 377
35.5.9 /var/lock : Lock files 379
35.5.10 /var/log : Log files and directories 379
xxi
Contents
35.5.11 /var/mail : User mailbox files (optional) 379
35.5.12 /var/opt : Variable data for /opt 380
35.5.13 /var/run : Run-time variable data 380
35.5.14 /var/spool : Application spool data 381
35.5.15 /var/tmp : Temporary files preserved between system reboots . 382
35.5.16 /var/yp : Network Information Service (NIS) database files (op-
tional) 382
35.6 Operating System Specific Annex 382
35.6.1 Linux 382
35.7 Appendix 386
35.7.1 The FHS mailing list 386
35.7.2 Background of the FHS 386
35.7.3 General Guidelines 386
35.7.4 Scope 386
35.7.5 Acknowledgments 387
35.7.6 Contributors 387
36 httpd — Apache Web Server 389
36.1 Web Server Basics 389
36.2 Installing and Configuring Apache 393
36.2.1 Sample httpd.conf 393
36.2.2 Common directives 394
36.2.3 User HTML directories 398
36.2.4 Aliasing 398
36.2.5 Fancy indexes 399
36.2.6 Encoding and language negotiation 399
36.2.7 Server-side includes — SSI 400
36.2.8 CGI — Common Gateway Interface 401
36.2.9 Forms and CGI 403
36.2.10 Setuid CGIs 405
36.2.11 Apache modules and PHP 406
36.2.12 Virtual hosts 407
37 crond and atd 409
37.1 /etc/crontab Configuration File 409
37.2 The at Command 411
37.3 Other cron Packages 412
xxii
[...]... convenient Commands under the GNU free software license are superior in this way: they have a greater number of options than traditional U NIX commands and are therefore more flexible , for example, ls -a -l, ls -l -a, or ls -al —any of these will list all files in long format & - commands take the additional arguments -h and help You can All GNU type a command with just this on the command-line and get a... > You will see that the command cat writes the contents of a file to the screen, allowing you to view your letter It should match exactly what you typed in Your command-line keeps a history of all the commands you have typed in Ctrlp and Ctrl-n will cycle through previous commands entered New users seem to gain tremendous satisfaction from typing in lengthy commands over and over Never type in anything... sequences begin with the letters AT and are called ATtention commands AT commands are sent by your computer to configure your modem for the current telephone line conditions, intended function, and serial port capability—for example, there are commands to: enable automatic answering on ring; set the flow control method; dial a number; and hang up The sequence of commands used to configure the modem is... issue these commands is discussed in Section 32.6.3, 34.3, and 41.1 and will become relevant when you want to dial your Internet service provider (ISP) Because each modem brand supports a slightly different set of modem commands, it is worthwhile familiarizing yourself with your modem manual Most modern modems now support the Hayes command set—a generic set of the most useful modem commands However,... you type the command ls to list the contents of a directory To see a hidden file you must use the command ls -a The -a option means to list all files as well as hidden files Another variant is ls -l, which lists the contents in long format The - is used in this way to indicate variations on a command These are called command-line options or command-line arguments, and most U NIX commands can take a number... yet Most U NIX commands do not give any kind of message unless something went wrong (the passwd command above was an exception) If there were files, you would see their names listed rather blandly in columns with no indication of what they are for 2.6 Command-Line Editing Keys The following keys are useful for editing the command-line Note that U NIX has had a , and other keys may long and twisted evolution... X or Y; and *[a-d]id matches all files ending with aid, bid, cid or did; and *.{cpp,c,cxx} matches all files ending in cpp, c or cxx This way of specifying a file name is called a glob expression Glob expressions are used in many different contexts, as you will see later 32 4 Basic Commands 4.4 Usage Summaries and the Copy Command 4.5 Directory Manipulation 4 Basic Commands 4.4 Usage Summaries and the... terminal date Prints out the current date and time (The command time, though, does something entirely different.) You should now use the man command to look up the manual pages for all the commands that you have learned Type man cp, man mv, man rm, man mkdir, man rmdir, man passwd, man cd, man pwd, and of course man man Much of the df Stands for disk free and tells you how much free space is left on... for source code, file formats, and file systems.- Go to the end of a file ssss Search backward through a file for the text ssss ¤ ✞ LESS=-Q export LESS ✝ ✆ and then logging out and logging in again But this is an aside that will make more sense later.) 38 4 Basic Commands 4.9 Some Basic Commands - at the & 4.10 The mc File Manager 4 Basic Commands lynx Opens a URL URL stands for Uniform Resource Locator—a... Error Messages All of U NIX is case sensitive A command with even a single letter’s capitalization altered is considered to be a completely different command The same goes for files, directories, configuration file formats, and the syntax of all native programming languages 4.1 The ls Command, Hidden Files, Command-Line Options In addition to directories and ordinary text files, there are other types of files, . LINUX: Rute User’s Tutorial and Exposition Paul Sheer August 14, 2001 Pages up to and including this page are not included by Prentice Hall. 2 “The reason we don’t sell billions and billions. inetd 291 30 exim and sendmail 299 31 lilo, initrd, and Booting 317 32 init, ?getty, and U NIX Run Levels 325 33 Sending Faxes 333 34 uucp and uux 337 35 The LINUX File System Standard 347 36 httpd. Understand . . 2 1.6 LPI and RHCE Requirements 2 1.7 Not RedHat: RedHat-like 3 1.8 Updates and Errata 3 2 Computing Sub-basics 5 2.1 Binary, Octal, Decimal, and Hexadecimal 5 2.2 Files 7 2.3 Commands