Tuesday, December 6, 2011

The echo command

The echo command echoes its arguments separated by blanks and terminated by a new line on the standard output.
Syntax:
              echo [arg] 
              echo[-n][arg]


The /user/bin/sh version understands the following C-like escape sequences:
 \b  backspace
 \c  print line without newline
\n   new--line
\r    carriage return
\t    tab
\v   vertical tab
\\    backslash
\n   where n is the 8 bit character whose ASCII code is the 1,2or 3 digit octal number representing that character.

The following option is available to /usr/bin/sh users only if /usr/ucb preceeds /usr/bin in the user's path.It is available to  /usr/csh users regardless of the PATH:
-n  Do  not add newline to the output

The echo command is useful for producing diagnostics in command files, for sending known data into a pipe, and for displaying the contents of environment variables.

The next command will be bc which is an arbitrary-precision arithmetic language in unix

Sunday, November 27, 2011

Choosing a Password and Password Files

Choosing a Password:


Passwords must be constructed to meet the following requirements:


  • Each password must have atleast PASSLENGTH characters as set in /etc/default/passwd file.PASSLENGTH must contain a minimum of 6 characters, but only the first 8 characters are significant.
  • Each  password must contain at least 2 alphabetic characters and atleast 1 numeric or special character.
  • Each password must differ from the user's login name and any reverse or circular shift of that login name. For comparison purposes, an upper case letter and its corresponding lower case letter are equivalent .
  • New passwords must differ from the old by atleast 3 characters.

Password Files:

The passwd  command uses the files /etc/shadow, /etc/passwd and /etc/oshadow.
The file /etc/passwd contains the following information for each user:
  • login name
  • dummy password
  • numerical user ID
  • numerical group ID
  • comment
  • initial working directory
  • program to be used as the shell
passwd is an ASCII file . Each field within each user's entry is separarted from the next by a colon. The comment field  can contain any information that the user desires. each user is separated from the next by a new-line. If the shell field is null, /usr/bin/sh is used.

This file has user login information and general read permission. It can therefore be used , to map numerical user ID's to names.
The password field consists of the character x.Password information is contained in the file /etc/shadow.




The next command will be the echo command.


Wednesday, November 23, 2011

The passwd command- continued

To recollect the syntax of the passwd command is:
              passwd[name]
              passwd[-l |-d ][-f][-n min][ -x max][-w warn] name
              passwd -s [-a]
              passwd -g [name]


The following options can be used only by a privileged user:

  • -l: Locks password entry for name.
  • -d: Deletes password for name. The login name will not be prompted for password.
  • -n: Sets minimum field for name.  The  min field contains the minimum number of days between password changes for  name.  If value of  min  >value of  max, the user may not change the password.Always use this option with the -x option, unless max is set to -1(ageing turned off ). In that case, min need not be set.
  • -x: Sets maximum field for name. The max  field  contains the number of days that the password is valid for name. The ageing of name  will be turned off if max is set to -1.
  • -w: Sets  warn  field for name. The warn  field contains the number of days the user will be warned before the password expires.
  • -a:  Shows password attributes for all entries. Use only with -s option ; name  must not be provided.
  • -f:  Forces the user to change password at the next login by expiring the password for name.
 Any user may use the -s option to show password attributes for one's own login name.
The format of the output will be:
name status mm/dd/yy min max warn

 Or, if password ageing information is absent,
name status

Super users may change any password; hence; passwd does not prompt privileged users for the old password. Privileged users are not forced to comply with password ageing and password construction requirements. A privileged user can create a null password by entering a carriage return in response to the prompt for a new password.

The passwd command exits with one of the following values:
0 SUCCESS
1 Permission denied
2 Invalid combination of options
3 Unexpected failure. Password file unchanged.
4 Unexpected failure .Password file is missing.
5 Password file(s) busy .Try again later
6 Invalid argument to option.


If root deletes a password for a user with the passwd -d command and password ageing is in effect for that user, the user will not be allowed to add a new password until the NULL password has been aged.This is true even if  the PASSREQ flag in /etc/login/default  is set to YES. This results in a  user without a password. It is recommended that the -f option be used with the  -d option so that the user is forced to change the password at the next login.


The next post will list the rules for choosing a password and the details of the files used by the passwd command.

Monday, November 21, 2011

The passwd command

The passwd command changes the password or lists attributes assosciated with the user's login name. Additionally, privileged users may use this command to install or change passwords and attributes assosciated with any login name.

Syntax:
              passwd[name]
              passwd[-l |-d ][-f][-n min][ -x max][-w warn] name
              passwd -s [-a]
              passwd -g [name]

  The behaviour of this command is extremely system-dependent.It asks you to enter your old  password, and if that is typed correctly,prompts you to enter your new password twice.The password may be chosen by a unix system or customized by the user. Some system administrators implement password aging which for security reasons forces the user to change the password after a certain period of usage.

Unix updates the corresponding files /etc/passwd  and /etc/shadow  for every change in password.
/etc/passwd  lists information about users.A user can read this file but not write into it. Each field of information is separated from the next by a ':' .An /etc/passwd file  dispalys login name, encrypted password,user ID, group Id, comment , default  working directory, default working shell.

There is another password file present in  /bin  directory called /bin/passwd . It is this file that actually gets executed when we change the password. Thus, /bin/passwd  is  an executable file which permits changing of password, whereas /etc/passwd  contains the information about each user.
 I shall discuss the options of the passwd command in the next post.

The uname command

The command uname prints the name of the current unix system.

Syntax:
uname[-amnprsv]
uname[-S system_name]
uname prints the current system name of the unix system to standard output.It is mainly useful to determine which system one is using.The options cause selected information returned by uname and/or sysinfo command to be printed:
  • -a : Print all information.
  • -m: Print the machine hardware name.
  • -n:  Print the node name(name by which the system is known to the communication  network)   .This is the default setting.
  • -p: Print the processor type of the current host.
  • -r: Print the operating system release.
  • -s:Print the name of the operating system.
  • -v: Print the version of the operating system.
 On your computer specifying a system name argument to the -S option may change the node name. The system name argument is restricted to SYS_NMLN  characters.SYS_NMLN is an implementation specific value defined in <sys/utsname.h>  file. Only the super-user is allowed to use this capability.

The next post will talk about the passwd command.

Tuesday, November 15, 2011

The tty command

The unix command tty displays the name of the terminal type.tty is the controling terminal interface.
The file /dev/tty is, in each process a synonym for the control terminal assosciated with the process group of that process. It can be used for programs that demand the name of a file for output, when typed output is desired .

Syntax:
            tty[-l][-s]
 The tty command prints the path name of the user terminal.
-l prints the synchronous line number to which the user's terminal is connected, if it is on an active
    synchronous line.
-s inhibits the printing of the terminal path name, allowing one to just test the exit code.
    The exit codes are as follows:
 2 if invalid options were specified
 0 if standard input is a terminal.
 1 otherwise

The error message  not an active synchronous line,  appears if the standard input is not a synchronous terminal and -1 is specified.

The error message  not a tty, appears if the standard input is not a terminal and -s is not specified.

The who command -continued

The options assosciated with the who command are as follows:

  • -u:    This option lists only those users who are currently logged in .The name  is the user's login name. The line is the name of the line as found in the directory /dev. The  time is the time that the user logged in. The  idle column contains the number of hours and minute  since  activity last occurred on that particular line. A dot(.) indicates that the terminal has seen activity in the last minute and is therefore 'current'. I f more than 24 hours have lapsed or the line has not been used since boot time, the entry is marked old. This field is useful to find out whether a person is currently working at the terminal line or not. The pid is the process-ID of the user's shell. The  comment is the comment field assosciated with this line as found in  /sbin/inittab  file. This can contain information about where the terminal is located, the telephone number of the data set, type of terminal if hard-wired and so on.
  • -T:     This option is same as the -s option except that the state  of the terminal line is printed.The state  describes whether  someone else can write to that terminal. A '+' appears if the terminal is writeable by anyone, else a '-' sign appears.  root  can write to all lines whether a '+' appears or a '-'.If a bad line is encountered a question mark(?) is printed.
  • -l:       This option lists only those lines on which the system is waiting for someone  to login.The  name is LOGIN  in such cases. Other fields are same except that the  state  field does not exist.
  • -H:     This option will print column headings above the  regular output.
  • -q:      This is a 'quick who' listing only the names and numbers of the users currently logged in. When this option is used all other options are ignored.
  • -p:      This option lists any process that is currently active and has previously been spawned by init. The  name is the name of the program executed by init   as found in /sbin/inittab file. The state,line  and idle  fields have no meaning .The  comment  field shows the  id  field from the   /sbin/inittab  file that generated this process.
  • -d:       This option displays all processes that have expired and not been regenerated by init.The exit field appears for dead processes and  contains the termination and exit values, as returned by the wait command. This can be useful in determining why a process terminated.
  • -b:        This option indicates the time and date of the last reboot.
  • -r:         This option indicates the current run level of the init process.It also displays the process termination status ,process-ID and process exit status under the idle,pid and the comment  headings respectively.
  • -t:          This option indicates the last change to the system clock via the date  commnad , by root
  • -a:         This option processes /var/adm/utmp  file or the named file with all options turned on.
  • -s:         This option is the default and lists only the  name, line and time fields respectively.
  • -nx:       This optin takes a numeric argument, x , which specifies the number of users to display per line. x must be at least 1. The -n option must be used with -q.

After a shutdown to the single user state, who returns a prompt.The reason is that since /var/adm/utmp file is updated at login time and there is no login in single user state, who cannot report accurately on this state.  who am i  however returns the correct information.
The who command uses the files / var/adm/utmp, / var/adm/wtmp  and /sbin/inittab.

 The next post would be about tty command.

Sunday, November 13, 2011

The who command

The who command lists the login names of everyone currently working on your system. the tty designation refer to the special files that correspond to each user's terminal. The date and time at which each user logged in are also shown.

Syntax:
        who[-uTlHqpdbrtas] [file]
        who -qn x[file]
        who am i
        who am I

The who command can list the user's name,terminal line,login time,elapsed time since activity occured on the line and the process-ID of the command interpreter(shell) for each current unix system user. It examines the   /var/adm/utmp  file to obtain its information.If file  is given , that file, is examined. 

The am i or am I  option identifies the user invoking the who command.

The general format for output is:
name [state] line time [idle] [pid] [comment] [exit]

The name,line and time information is produced by all options except -q. The state information is produced only by -T; only u and -l produce the idle and pid information; and the comment and exit information is produced only by -a. With options who can list logins , logoffs, reboots and  changes  to the system clock, as well as other processes  generated by the init process.
The  options  will be discussed in the next post.

Friday, November 11, 2011

The date utility-Part 2

The date utility also supports specifications of native language translations of month and weekday-names. The names used for a language are based on the locale specified by the environment variables LC_TIME and LANG in the environ command. The month and weekday names are taken from a file whose format is specified in strftime command. This file also defines country specific date and time formats such as %c, which defines the default format of date 


The field descriptors mentioned in the previous post are:
 a- abbreviated weekday name
 A- full weekday name
 b- abbreviated month name
 B- full month name
 c- country specific date and time format
 d- day of month 01 to 31
 D- date as %m/%d/%y
 e-  day of month 1 to 31(single digits are preceeded by a blank.
 h- abbreviated month name(alias for %b)
 H- hour 00 to 23
 I- hour 1 to 12
 j- day of year 001 to 366
 m- month of year 01 to 12
 M- minute 00 to 59
 n- insert a new line character
 p- string containing anti-meridiem(A.M.-before noon ) or post meridiem(PM- after noon)    
      indicator

 r- time as %I:%M:%S:%p
 R- time as%H:%M
 S- second 00 to 61 allow for leap seconds
  t- insert a tab character
 T- time as %H:%M:%S
 U- week number of year(Sunday as first day of the week)-0 to 53
w- day of week sunday = 0
W- week number of year(Monday as first day of the week) 00 to 53
x- Country specific date format
X- Country specific time format
y- Year within century 00 to 99
Y- year as ccyy(4 digits)
Z- time zone name

Examples:

1.date
   Lists the date and time of the server. Below is an example of the output.

   Fri Nov 11 16:47:32 MST 2011

2.date '+DATE: %m/%d/%y%nTIME:%H:%M:%S'
   Would list the time and date in the following format.
   
    DATE: 11/11/11
    TIME:  13:50:15

The following example would work only if you are the super user:
3.date -s "11/11/2011  01:48:00"

Sets the date to the date and time shown.


The next post would be about the who  command.

 

Saturday, November 5, 2011

The date utility-Part 1

date utility is used to display current time and date.No user can modify the date and time unless they are the  superuser  i.e the system administrator.This is required for the smooth functioning of the system. 
Syntax:
              date[-u][+format]
              date[-a[-]sss.fff][-u][[mmdd]HHMM | mmddHHMM[cc]yy]
 If no argument is given, or if the argument begins with +, the current  current date and time are printed.


-a[-]sss.fff     Slowly adjusts the time by sss.fff seconds,where fff represents fractions of a          
                        second.The adjustment can be positive or negative.The clock of the system will be
                        speeded up or slowed until it has drifted by the number of seconds specified.
-u                    Displays (or sets) the date in GMT(Greenwich Mean Time), bypassing the normal 
                        conversion to or from normal or local time.
mm                 is the month 
dd                   is the day of the month
HH                  is the hour in the 24 hr system.
MM                 is the minute 
cc                   is the century minus one.
yy                   is the last two digits of the year .The month, day,year and century may be
                        omitted; the current values are applied as defaults. 
                        For eg: date 12301600 sets the date to Dec 30, 4:00 PM. The current year is the  
                        default because no year is supplied . The system operates in GMT. date takes  
                        care of the conversion to and from the local standard and daylight saving time.
                        Only the superuser may change the date.After successfully setting the date and  
                        time date displays the new date according to the default format. The date utility
                        uses the TZ in environ  command to determine the correct time zone information.
+format         If the argument begins with +, the output of the date is under the control of the  
                        user. Each Field Descriptor, described in the next post,is preceeded by %, and  
                        is replaced  in the output by its corresponding value.A single % is encoded by  
                        %%.  All other characters are copied to the output without change. The string is 
                        always  terminated by a newline character.If the argument contains embedded 
                        blanks ,it must be qouted. 

Thursday, November 3, 2011

Unix utilities- banner and cal

Utilities  are  the core tool kit of the Unix command set, including banner ,cal, who and many others.  Subcategories include:  
1. System utilities – administrative tools such as mkfs, fsck, and many others.
 
2.User utilities – environment management tools such as passwd, kill, and others.


banner:  The banner utility makes posters. 
                  Syntax:  banner strings
The banner utility prints its arguments , each up to 10 characters long, in large letters on the standard output.

However the banner utility works only in Unix and not in Linux.


cal:   The cal  utility prints a calendar.
          Syntax:  cal [ [month] year]
The cal utility prints a calendar for the specified year. If a month is also specified, a calendar is printed just for that month.If neither is specified, a calendar for the present month is printed.
The month is a number between 1 and 12. The year can be between 1 and 9999.The calendar produced is that for England and the United States, i.e. the Gregorian calendar.

An unusual calendar is printed for September 1752.In this month ,11 days were skipped to make  up for lack of leap year adjustments. To see this calendar type:  cal 9 1752

Also note that cal 83 refers to the year 83 and not to the year 1983.

Next we will be discussing the date utility which has a number of options.  

Wednesday, November 2, 2011

Internal and External Commands

Unix commands are grouped into two categories-Internal and External. There is a set of commands which are part of the shell and to execute them the shell does not need to search the given path in the PATH  variable. These are also called  shell builtins or Internal Commands. The shell does not fork a new process for these commands.

Commands that are available as independently compiled C programs usually located in the /bin or the /usr/bin directory are called  External Commands.  The shell searches the path for these command files. An example is the 'ls ' command which is used for directory listing.

To find out whether a particular command is Internal or External  and to find out the location of  an External Command, the 'type' command is used.

Example:

$ type ls
       ls is /bin/ls
the above command returns the location or the path of the ls command .Therefore ls is an external command.

$ type echo
          echo is a shell builtin
the 'echo' command is an Internal Command or a shell builtin.

$ type LS
         LS: not found

As unix is case sensitive the shell cannot locate the ls command when typed in upper case(capitals).

In the next post I shall list out some  unix utilities.

Tuesday, September 13, 2011

Shell Commands

A program is a set of instructions to the computer.Programs that can be executed by the computer without need for translation are called Executable Programs or Commands.
As a user of the unix system ,there are many standard programs and tools available to you.
You can also employ system calls, subroutines etc. to write programs and develop software on unix. 


The syntax of  a unix system command line is:

          command option(s) arguments


 Command is the name of the program you want to run.



Options or Flags modify how a command runs.Flags are generally one letter codes preceeded by a '-' sign,'+' sign or by no character.


Parameters or Arguments specify data that the command processes,usually the name of a directory or file.
 
Space separates commands and arguments and arguments among themselves.If arguments need to have spaces and yet be treated as one argument, these must be enclosed in double quotes(") or single quotes(').


Each new command has to be entered after command line separators  which are a semicolon enter key and an ampersand(&).


Unix handles user commands through a COMMAND INTERPRETER. Command Interpreter  is  a special interface program that processes commands entered at the keyboard. After you log in a command prompt( a symbol that indicates that the interpreter is ready for the command to be entered) will be shown which may look like 
%
or
machine %


where 'machine' is the name of that particular unix system. The command prompt may be different as there are three command interpreters- the C shell, the Bourne shell and the Korn  shell.


To execute a command,enter  a command line when a prompt (such as a $ sign) appears on the screen. The shell considers your command as input, searches through one or more directories to retrieve the program you specifiedand conveys your request along with the program requested  to the kernel.The kernel then follows the instructions in the program and executes the command you requested.


After the program has finished running the shell signals that it is ready for your next command by printing another prompt.

Tuesday, August 30, 2011

Basics of Unix Commands

Unix is a command line based operating system. Unix commands can be combined to perform complex tasks.To perform these tasks repeatedly these commands can be placed in files called shell scripts and these shell scripts can be executed to provide the required output.

Unix users and processes:


Unix has two basic concepts : files have places and processes have life . All files are placed at some location and each process travels  in a life cycle from birth to death.


Each user in unix is identified by uniquely by an  identification number,name and group identification.A user is able to access  a unix system only after being given a login name and password by the system administrator. When a user tries to access a unix system it displays a  login  prompt where the users types in the login name and password. If the user is a valid user , a shell prompt($) appears on the screen where unix commands can be typed..


A user can end a unix session by pressing < ctrl+d >.  Ctrl+d kills a process.


Command Line is defined as the line on which the shell prompt occurs and a command with its arguments is  entered  and is considered complete only when the enter key is pressed.
The command may spill over multiple lines shown by a secondary prompt (>). The complete line is then fed to the shell as its input for interpretation and execution.


Unix is CASE SENSITIVE. All unix commands must be typed in LOWER CASE.


The next post would be concerning shell commands- the syntax and the  actual commands.


 

Saturday, August 27, 2011

The Unix System Architecture

An operating system(OS) is an intricately woven fabric of programs.The programs are usually coded in the assembly language and are  specific to the processor around which the computer is built. The unix OS ,on the contrary, is written largely in the 'C' language which is not processor dependent. However, part of the unix os is written on the Assembler. This makes Unix highly portable- which means that it can run on various processors with little modification.
The structure of the Unix OS makes it a better OS as compared to other conventional operating systems.

The responsibilities of an OS include command interpretation,I/O control, communications and a lot more .To perform these tasks a large number of simple as well as complicated programs are needed. These programs can be independent or interdependent. In conventional operating systems, all these programs are put  together forming one large program that occupies a large amount of memory. Therefore the system response is very slow. Unix with a fresh structural approach does not slow down the system.

The Unix system can be divided into four major units. These units work together but are still separate so that one large portion of the memory does not get blocked and slow the system down.
 
The four units are:-


1. Kernel- A core unit that interacts with the hardware for low-level functions. The kernel is  a program that constitutes the nucleus of the operating system. It co-ordinates the internal functions of the computer, such as allocating system resources. The kernel works invisibly. The user will never be aware of it while working on the system.


2.Shell- An outer unit that interacts with the user to perform functions desired by the user. The shell is a program that acts as a liason between the user  and the kernel by interpreting and executing user commands. As it reads user input and sends messages to the user it is described as interactive.

3.Commands - Commands  are compiled C programs that perform a specific operating system job. These commands are invoked by name through the shell. Unix has very few in- built commands(internal commands) like 'echo'and 'pwd'. For these no separate C compiled programs are required. These are the shell's inbuilt features and the  shell is able to interpret them itself. Unix commands  perform  a range of functions like editing, copying , erasing files, sending and receiving emails etc.

4.File System- The file system is a collection of all the files available on the computer. It allows you to store and retrieve information easily.

Thursday, August 25, 2011

About

http:// test.skimlinks.comtest.skimlinks.com
Unix is an operating system that was developed at AT&T's Bell Laboratories in the early 1970's by Ken Thompson ,Dennis Ritchie and others. The unix system has become quite popular since its inception, running on machines of varying processing power from microprocessors to mainframes and providing a common execution environment across them. Unix systems usually offer the best performanceand support for the most concurrent users of any computer configuration. It was designed to be a multi-user, time sharing operating system that can efficiently handle a large number of user stations running different programs simultaneously.

Unix supports many programming languages,databases and program development tools. it is an open system, so it runs on many different hardware systems. Today, Windows  systems are being networked together to provide the multi-user capability that unix provides. Unix can also support graphic applications by using special X  Windows stations.

This blog aims at giving you an insight into the intricacies of the Unix operating system.