219
© 2002 ComputerPREP, Inc. All rights reserved. Linux+ Linux+

© 2002 ComputerPREP, Inc. All rights reserved. Linux+

Embed Size (px)

Citation preview

© 2002 ComputerPREP, Inc. All rights reserved.

Linux+Linux+

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 1:Linux Characteristics

and Features

Objectives

• List common Linux functions and services• Identify basic concepts, terms, and function of

system components• Identify common distributions• Describe the functions and features of a Linux

solution• Understand the GNU Public License• Differentiate between the GPL and additional

licensing schemes

What Is Linux?

• Linux and UNIX• Kernels

LinuxCharacteristics

• The shell, applications, and daemons• Linux is multiuser• Linux is multitasking• Linux is weakly integrated• UNIX/Linux is command-line oriented• Linux and stability• Network support

Common LinuxFeatures and Roles

• Clients• Servers• Additional features and roles• Using "free" software

CommonLinux Distributions

• Distributions versus vendors• Custom kernels and specialized platforms• Strengths and weaknesses of various distributions

Open SourceLicensing

• GNU Public License• Copyright versus "copyleft"• Common open source licensing schemes

Summary

List common Linux functions and services Identify basic concepts, terms, and function of

system components Identify common distributions Describe the functions and features of a Linux

solution Understand the GNU Public License Differentiate between the GPL and additional

licensing schemes

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 2:Preparing

for Installation

Objectives

• Identify the role of the system and determine software according to customer requirements

• Validate that system hardware is supported by the Linux operating system

• Identify hardware and installation issues with mobile system hardware

• Ensure that system hardware is configured correctly before installation

Planning the Implementation

• Identifying the system role• Common software packaging options• Evaluating support requirements• Determining software requirements

ValidatingHardware Requirements

• Common hardware terms• System cards and peripherals

System BIOSand the CMOS

• Basic Input/Output System (BIOS)• Complementary Metal Oxide Semiconductor

(CMOS)

Standard IRQAssignments

• System timer• Keyboard controller• Real-time clock• COM1 / COM2 / COM3• LPT1 / LPT2• PS/2 mouse port (motherboard)

ISAand PCI

• Expansion slots• Industry Standard Architecture (ISA)• Peripheral Component Interconnect (PCI)• Local bus architecture

– Accelerated Graphics Port (AGP)

Plug-and-PlayDevice Configuration

• Requires– System BIOS that supports plug-and-play– Plug-and-play-compliant operating system– Plug-and-play device (such as a modern PCI

card)

PeripheralConnectors and Cables

• PS/2-style connectors• Parallel ports• Serial ports• USB ports• IEEE 1394 (FireWire and i.Link)• Infrared Developers Association (IrDA)

Small ComputerSystems Interface (SCSI)

• SCSI types• Drivers, maximum device numbers, and logical

numbering• SCSI termination

– Active Passive

Monitors andVideo Cards

• Monitor terms• Resolution• Color depth• Video RAM

MobileSystem Hardware

• Personal Computer Memory Card Industry Association (PCMCIA)

• Hot swapping and system BIOS

Documentingthe Server

• Linux server documentation items• Additional considerations

ObtainingLinux Information

• Software and hardware manuals• HOWTO documents• Web sites• Linux User Group meetings• Info and man pages

Summary

Identify the role of the system and determine software according to customer requirements

Validate that system hardware is supported by the Linux operating system

Identify hardware and installation issues with mobile system hardware

Ensure that system hardware is configured correctly before installation

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 3:Installing Linux

Objectives

• Determine the appropriate method of installation based on the environment

• Identify the necessary storage space and partition scheme for Linux implementation

• Differentiate between GUI and text-based installation methods

• Install Linux

Objectives (cont'd)

• Explain how to structure a command at the Linux command line

• Log on to a Linux machine and use su• Describe "root etiquette"• Confirm your Linux configuration• Explain the Linux kernel naming convention

Linux andHardware Compatibility

• Finding the right Hardware Compatibility List (HCL)– Red Hat– SUSE– Slackware

Storage Spaceand Partition Schemes

• Disk preparation• Clusters• Active partition• Logical drive• Format• Root directory

DiskPartitions

Common LinuxPartition Schemes

• /boot/• <swap>• /

Linux, LILO andthe 1024 Cylinder Limit

• Cylinders versus megabytes• Assorted hard drive installation guidelines

Reasons forMultiple Partitions

• Facilitates troubleshooting• Increases reliability

PartitionNaming Schemes

• Windows and Linux• LILO: The Linux Loader• Finding and formatting disks

InstallationMedia and Types

• Media– Boot disk– CD-ROM– Network– PLIP– PCMCIA

• Installation types

Configuring TCP/IP

• IP addressing– Class A– Class B– Class C– Reserved

• Netmasks• Private IP addresses• Domain Name System

AdditionalServices

• Kerberos• NIS• NFS• LDAP• SMB• Personal firewall

LoadableKernel Modules

• Automated formatting• Security measures

– Shadow passwords– Enhanced encryption options

• Installation checklists

LinuxCommands

• Can contain up to three parts– The command itself– A collection of options– An argument

YourLogon Account

• Logging on and off– The root account– Root etiquette– The su –c command

• Changing your password

ConfirmingInstallation

• Secure Shell (SSH)• Files and directories in the /proc directory

The LinuxKernel Naming Convention

• Stable• Beta• The uname command

Summary

Determine the appropriate method of installation based on the environment

Identify the necessary storage space and partition scheme for Linux implementation

Differentiate between GUI and text-based installation methods

Install Linux

Summary (cont'd)

Explain how to structure a command at the Linux command line

Log on to a Linux machine and use su Describe "root etiquette" Confirm your Linux configuration Explain the Linux kernel naming convention

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 4:Navigating the System

Objectives

• Describe the Linux system hierarchy• Identify file system types• Use system navigation commands• Create and delete files and directories• Assign permissions using chmod• Create hard and symbolic links• Use the find command

The LinuxFile System Hierarchy

• File location names• Understanding the root directory• Hidden files

LinuxFile Name Conventions

• File name completion– File name completion characters– File name matching character keys

Paths

• Absolute paths• Relative paths and the current working directory• Periods, double periods, and tildes

Working withDirectories using ls

• Listing directories• Long form listing• Changing the work directory• Creating and deleting subdirectories

BasicAccess Permissions

• Permission bits• Reading permissions• Changing permissions• The umask command

AdditionalAccess Control Bits

• Save text permission• SUID/SGID permissions• chattr• lsattr• The immutable bit

Hard andSymbolic Links

• Creating hard links• Creating symbolic links

FindingFiles with find

• Predicates and meanings to find

Usingwhereis and locate

• whereis searches for binaries found in the known search path

• locate can be customized so that only certain files can be found

MultipleCommands and xargs

• xargs modifies the output of a previously executed command so that a new command can read the output as a command-line argument

Summary

Describe the Linux system hierarchy Identify file system types Use system navigation commands Create and delete files and directories Assign permissions using chmod Create hard and symbolic links Use the find command

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 5:Using Vi

Objectives

• Use vi• Differentiate between vi's command and editing

modes• Copy and paste text using vi• Open a command prompt in vi• Distinguish vi from other text-editing applications

Vi

• Running vi• Edit mode and command mode• Vi command structure• Quitting vi• Cursor movement• Inserting text into a file• Deleting, posting and yanking• Search and replace commands• Customizing vi and the .exrc file

Pico

• Pico commands– CTRL + W– CTRL + K– CTRL + U– CTRL + R– CTRL + O– CTRL + Y– CTRL + V– CTRL + T– CTRL + G– CTRL + X

Summary

Use vi Differentiate between vi's command and editing

modes Copy and paste text using vi Open a command prompt in vi Distinguish vi from other text-editing applications

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 6:An Arsenal of

Linux Commands

Objectives

• Create, copy and delete files and folders• Use text-reading commands• Conduct Telnet, SSH, FTP, Web and e-mail

sessions• Set system time• Use system configuration applications

Copying, Movingand Deleting Files

• Copying cp• Moving (renaming) mv• Deleting rm• Deleting empty directories rmdir

File Content-Listing Commands

• Using more and less• Using cat to list files• Using head and tail

Simple TextFile Utilities

• Simple text commands– wc– diff– tee– ispell

• Cut and paste

MiscellaneousCommands

• The date command• The timetool command• Setting the time zone• The w command• The cal command• The bc command• Clear and cd• Viewing command history and executing

commands

Starting theX-Window System

• Runlevel• The startx command

NetworkClients

• Telnet• Secure Shell (SSH)• FTP• Lynx

Pine

• Newsgroups• The pine command

Linuxconfand Netconf

• Red Hat Package Manager (RPM)• ncurses• gnome-linuxconf• Network Configurator

Summary

Create, copy and delete files and folders Use text-reading commands Conduct Telnet, SSH, FTP, Web and e-mail

sessions Set system time Use system configuration applications

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 7:Customizing the

Linux Logon Environment

Objectives

• Read and change environment variables• Use virtual terminals• Customize your logon environment by modifying

files such as .bashrc• Identify the files that are responsible for

establishing a logon environment• Create command aliases• Access the online help system

Understanding the Understanding the Logon EnvironmentLogon Environment

• Your logon shell• Your home directory• Your environment variables• Virtual terminals

– CTRL + ALT + F2CTRL + ALT + F2

Modifyingthe Search Path

• Making search path changes persistent– The which command and the search path

Startup Files

• Initialization files• Environment initialization files• Command aliases

TheLinux Manual

• Layout of the manual– Manual sections

• A typical manual page (name, synopsis, description, options, example, files, bugs)

• Xman

Summary

Read and change environment variables Use virtual terminals Customize your logon environment by modifying

files such as .bashrc Identify the files that are responsible for

establishing a logon environment Create command aliases Access the online help system

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 8:User Management

Objectives

• Create and delete users• Manage groups• Modify user settings• Identify the purpose of the /etc/skel directory• Modify user permissions with chown and chgrp• Describe the gpasswd command• Identify the purpose of the sudo suite of tools

UserAccounts

• Properties of an account• The password file• The shadow password file

– Enabling shadow passwords

AutomatedAccount Creation

• Account creation, modification and deletion• The useradd command• The passwd command• The usermod command• The userdel command• Automated account creation using linuxconf

PasswordManagement

• Password aging• Password checking• The chage command• Listing current users

Groups

• The /etc/group file• Managing groups

System Accounts and Special User Accounts

• Accounts with names such as daemon, sys and uucp used by system processes

• Special user accounts are limited logon shells dedicated for a single purpose

SUDO

• /usr/bin/sudo• /etc/sudoers• /usr/sbin/visudo• /etc/pam.d/sudo

Summary

Create and delete users Manage groups Modify user settings Identify the purpose of the /etc/skel directory Modify user permissions with chown and chgrp Describe the gpasswd command Identify the purpose of the sudo suite of tools

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 9:Managing Packages and Shared Libraries

Objectives

• Compile code from source packages• Recognize common errors concerning package

dependencies• Determine the cause of package version conflicts• Describe the purpose of shared libraries• Use ldd and ldconfig to manage libraries• Identify shared library errors

Packagesand Shared Libraries

• Compilers• Shared libraries• Source code

The TraditionalInstallation Method

• Compiling code from a tarball• Using a configure script

Using RPM

• Functions– RPM queries entire packages– RPM installs binaries or source files using only

one command– RPM maintains a database of installed

applications, libraries and daemons

RPMNaming Scheme

Package Name Version Release Architecture Ending . . - -

ext2resize 1.0.5 2 i386 rpm

RPM andthe Root Account

• Listing package contents• Listing all contents• Listing RPM descriptions• Verifying packages to learn about missing files• Querying a file from a package

DeterminingPackage Origin

• Gnu Privacy Guard (GPG) signatures

Installing,Upgrading and Deleting

• Installing remotely• Searching for an installed RPM• Deleting an RPM• Upgrading and rebuilding an RPM• Graphical utilities

Maintaining the RPM Facility and Obtaining RPM Files

• rpm –initdb: Creates RPM database• rpm –rebuilddb: Rebuilds database• RPMs are available at www.rpmfind.net,

www.redhat.com, www.mandrake.com

ManagingShared Libraries

• Using ldd• Identifying errors• Managing shared libraries with ldconfig

Summary

Compile code from source packages Recognize common errors concerning package

dependencies Determine the cause of package version conflicts Describe the purpose of shared libraries Use ldd and ldconfig to manage libraries Identify shared library errors

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 10:Managing Run Levels

Objectives

• Describe the Linux boot process• Stop the system in an orderly manner• Use single-user mode to handle problems• Specify a run level at boot time• Identify the /etc/inittab file• Use the fsck command• Explain how startup scripts operate• Use ksysv, ntsysv and chkconfig

TheBoot Process

• Run levels• Changing run levels

– Halting and rebooting the system• Single-user mode• Specifying init levels during system boot

TheInit Process

• The inittab file• The fsck program

The LinuxBoot Process

• Reading startup scripts• Graphical script editors

Summary

Describe the Linux boot process Stop the system in an orderly manner Use single-user mode to handle problems Specify a runlevel at boot time Identify the /etc/inittab file Use the fsck command Explain how startup scripts operate Use ksysv, ntsysv and chkconfig

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 11:I/O Redirection,

Variables and Shell Scripts

Objectives

• Differentiate between standard output and standard error

• Explain I/O redirection• Use regular expressions with the shell• Work with shell variables• Search within files for patterns using grep• Program basic shell scripts using common shell

commands

I/ORedirection

• I/O redirection operators• Filters• Pipelines• Redirecting standard error• Discarding standard error with /dev/null

Interactingwith the Shell

• Shell wildcards• Quoting and escapes

– Single and double quotation marks– The backtic character

Assigning and Reading Variables

• Deleting a variable• Logon environment variables

ShellScripts

• What is a shell script?• Writing a shell script• Running a shell script

– The dot command

Subshells

• Running scripts

Shell Scriptsand the Search Path

• The ~/bin directory• Subshells and local variables

FindingPatterns with Grep

• Grep– Searches a file or standard input for a specified

pattern

UnderstandingStatements

• Conditional• Loop

Summary

Differentiate between standard output and standard error

Explain I/O redirection Use regular expressions with the shell Work with shell variables Search within files for patterns using grep Program basic shell scripts using common shell

commands

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 12:Managing Processes and System Elements

Objectives

• Check system processes• Differentiate between a PID, a PPID and a child

process• Use foregrounded and backgrounded processes• Use kill, killall, ps and top• Prioritize processes using nice and renice• Sample CPU and Memory usage• Use cron to schedule processes

LinuxProcesses

• Interactive processes

System andNetwork Daemons

• Monitoring and managing daemon processes• Typical log files in the /var/log/ directory

– messages– boot.log– Lastlog– Maillog– Secure– httpd/

Process IDand Parent Process ID

• Process ownership, daemons, and supporting applications– Real and effective PID– Child processes

JobControl

• Foreground processes and background processes– Foregrounding and multiple jobs

• Options for kill and killall• Using nice and renice

MonitoringProcesses with ps

• Options for the ps command• Examples

Using pstree

• Provides a hierarchical view of the processes on the system

Managing Processeswith Top and Uptime

• The top program generates a continually updated list of processes, sorted according to CPU usage

• Top can also be used to kill processes

AdditionalMonitoring Applications

• vmstat• gtop and ktop• xosview• gdiskfree• df• du

SchedulingProcesses with Cron

• Cron job types– User-based– Systemwide

• Cron elements• The crontab command

Crontab Format

minutes hoursday of the

monthmonth weekday command

ControllingAccess to Cron

• Formatting cron.allow and cron.deny

Summary

Check system processes Differentiate between a PID, a PPID and a child

process Use foregrounded and backgrounded processes Use kill, killall, ps and top Prioritize processes using nice and renice Sample CPU and Memory usage Use cron to schedule processes

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 13:Managing

the Hard Drive

Objectives

• Identify commonly used file system formats used by Linux

• Use the /etc/fstab file• Use mount and umount to manage the file system• Mount and unmount partitions• Differentiate between /dev/ and /mnt/• Create and format new partitions

Common FileSystem Formats

• Ext2• Reiser• iso9660

The/etc/fstab File

• Dump, fsck and fstab

The/etc/mtab File

• Device naming review

Using themount Command

• Determining current file system status• Mounting and unmounting devices• Unmounting drives

Mount and Removable Media

• Unmounting removable media• The /etc/fstab file and mounting disks• Additional options to the mount command

Disk Partitioningand Formatting

• Replacing a faulty disk• Adding a disk due to system usage• Adding a new partition to an existing disk• Destroying information

Using thefdisk Command

• Using fdisk interactively• Adding a partition• Using mkfs and mke2fs

Fsck andFile System Integrity

• Mounted disks

Using thehdparm Command

• Provides information about IDE hard drives

Summary

Identify commonly used file system formats used by Linux

Use the /etc/fstab file Use mount and umount to manage the file system Mount and unmount partitions Differentiate between /dev/ and /mnt/ Create and format new partitions

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 14:The Kernel, Modules and

Customizing the Boot Process

Objectives

• Identify when to recompile the kernel• Distinguish between a monolithic and a modular

kernel• Load and manage kernel modules• Describe the purpose of the /etc/modules.conf file• Customize system boot by editing lilo.conf• Pass arguments to the kernel at the LILO prompt• Reconfigure GRUB using the /boot/grub/grub.conf

file

Locatingthe Kernel

• Kernel types– Modular

• Modules– Monolithic

• Root kits

Major Kernel Responsibilities

• Process scheduling• Input/output• Virtual memory• System calls• Device drivers

Why Updatethe Kernel?

• Increased stability• Additional features

– RAID support• Increased security

KernelModules

• Module location• Loading and listing system modules

– The modules.conf file– Linuxconf and the kernel– kernelcfg

Customizing the Boot Process

• Lilo• lilo.conf• Modifying lilo.conf• Additional LILO options• Troubleshooting lilo.conf

Using GRUB

• Re-running GRUB after editing /boot/grub/grub.conf

• Appending values at boot time

Summary

Identify when to recompile the kernel Distinguish between a monolithic and a modular

kernel Load and manage kernel modules Describe the purpose of the /etc/modules.conf file Customize system boot by editing lilo.conf Pass arguments to the kernel at the LILO prompt Reconfigure GRUB using the /boot/grub/grub.conf

file

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 15:Networking with Linux

Objectives

• Identify basic networking topologies and wiring types

• List common network types• Discuss common network protocols• Configure Linux for an IP network• Use network commands• Troubleshoot connectivity• Connect to NFS and Samba servers• Describe inetd, xinetd, and TCPWrappers

NetworkTopologies

• Bus• Ring• Star

Network Types

• Ethernet• Token ring• Tokens and beaconing

NetworkConnectivity Devices

• Hub• Switch• Repeater• Bridge• Router• Gateway• MAU

Static IPAddressing in Linux

• ifconfig• ifup• ifdown• linuxconf• netconf• netconfig• netcfg

ManualInterface Configuration

• Using dmesg to learn more about the NIC

DynamicAddressing

• Configuring Linux for DHCP• Pump and DHCP

TestingNetwork Connectivity

• The ping command• Address resolution and ARP

Understanding Ports

• The netstat command• Checking your machine's routing status with

netstat• The route command• Traceroute• Using lsof• Troubleshooting DNS

Connectingto Linux Daemons

• The Network File System (NFS)• The Network Information System (NIS)• Samba• The rlogin command

The Internet Daemonand TCPWrappers

• The Internet daemon– inetd.conf syntax– Using xinetd– Restarting inetd and xinetd

• TCPWrappers– Syntax for hosts.allow– Syntax for hosts.deny

TroubleshootingConnectivity Problems

• Permissions• Proxy servers and connectivity

Summary

Identify basic networking topologies and wiring types

List common network types Discuss common network protocols Configure Linux for an IP network Use network commands Troubleshoot connectivity Connect to NFS and Samba servers Describe inetd, xinetd, and TCPWrappers

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 16:Linux and Dial-up Access

Objectives

• Configure a client workstation for remote access• Select a modem to enable dial-up access• Use setserial to determine serial port speed• Use modem and connection troubleshooting tools• Explain how to configure ISDN connections

Modemsand Interfaces

• ISDN• Additional types of dial-up interfaces

– SLIP– CSLIP– PLIP

• Selecting the correct modem

Serial Ports

• /dev/ttyS0• /dev/ttyS1• /dev/ttyS2• /dev/ttyS3

UsingSetserial

• Allows you to obtain information about serial ports• Allows you to set values for serial ports

PPCConfiguration

• PPC authentication types– PAP– CHAP– MS-CHAP

• Point-to-Point Protocol Over Ethernet• PPP configuration files• PPP daemon files

The ModemChat Sequence

• Hayes commands

Activating and Listing the PPP Interface

• ifup ppp0• Kppp• Linuxconf• rp3

Troubleshootingthe Modem

• Troubleshooting the connection

ISDNand Linux

• Telephony• Basic Rate Interface/Primary Rate Interface• Configuring ISDN in Linux

Summary

Configure a client workstation for remote access Select a modem to enable dial-up access Use setserial to determine serial port speed Use modem and connection troubleshooting tools Explain how to configure ISDN connections

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 17:The X-WindowEnvironment

Objectives

• Describe the relationship between X-Window servers and window managers

• Specify background colors and fonts• Redirect X-Window sessions• Troubleshoot X-Window sessions• Reconfigure the X-Window environment using

standard applications

What IsX-Window?

• Components– X-Window server– X-Window client– Font server– Window manager– Virtual desktop software

NumberingX-Window Displays

• Starting X-Window clients in the background• X-Window options

– X-Window and color schemes– Geometry– The xwininfo command– Fonts– Colors– Title

RemoteX-Window Sessions

• Conducting a remote X-Window session– The xhost command

Conducting Remote Logon Sessions with X-Window

• Remote logons and X-Window• The xdm server• The X command

TroubleshootingX-Window

• The .X.err file• Killing problem X-Window applications

– The kill command– The killall command

ReconfiguringX-Window

• xf86config• SuperProbe• Xconfigurator• XF86Setup• Activating the mouse wheel in Linux

Summary

Describe the relationship between X-Window servers and window managers

Specify background colors and fonts Redirect X-Window sessions Troubleshoot X-Window sessions Reconfigure the X-Window environment using

standard applications

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 18:Printing in Linux

Objectives

• Add and configure printers• Manage print spools and queues• Troubleshoot common printing problems• Resolve printing problems based on user feedback

Linux Print Terminology

• Printer name

• Filter

• Print directory

• Print spooler directory• Print device• Printer daemon

UsingPrintTool

• Automatically probes existing parallel ports• Allows you to create entries in /etc/printcap

Connecting toa Remote Printer

• Requires– User name and password– Protocol– Name and IP address– Name of local print spooler directory

PrintingDocuments

• Applications and printing• The lpr command

PrintTroubleshooting

• Finding the parallel port• Printing multiple copies• Lpq• Lprm• Lpc

Summary

Add and configure printers Manage print spools and queues Troubleshoot common printing problems Resolve printing problems based on user feedback

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 19:Archiving and Restoring

Objectives

• List common backup methods and strategies• Identify common backup media• Recognize additional backup options• Use tar, compress, gzip and zip to back up files

onto tape archives• Troubleshoot backup and restore errors

Planning aBackup Strategy

• Determining which files to back up• Selecting a backup method• Verifying backup integrity• Planning and practicing restoration procedures

Selecting aBackup Method

• Full backup• Differential backup• Incremental backup• Copy• Comparing strategies

CommonBackup Media

• Floppy disks• Zip disks• Writable and rewritable CD-ROMs• Tapes• Choosing local or network backup• Mass backup devices

– CD jukebox– Stackloader

VerifyingBackup Integrity

• Verifying archive existence• Listing contents of archive• Verifying archive integrity• Offsite storage

CommonBackup Utilities

• tar• mt• dd• dump and restore• cpio• pax

Archivingand Compression

• Using tar to create and extract archives• Tar options• Extracting a single file or directory• Using compress/uncompress• Using gzip/gunzip• Using zip and unzip

Using thebzip2 Program

• The bunzip2 command• Additional applications

Troubleshooting Backupand Restore Errors

• Faulty media• Unintentional erasing• Improper storage• Common restoring errors

Summary

List common backup methods and strategies Identify common backup media Recognize additional backup options Use tar, compress, gzip and zip to back up files

onto tape archives Troubleshoot backup and restore errors

© 2002 ComputerPREP, Inc. All rights reserved.

Lesson 20:Maintaining and Troubleshooting

Linux

Objectives

• Describe software and hardware troubleshooting best practices

• Identify when to increase swap space• Identify boot failure messages• List options for providing fault tolerance• Fix systems with system boot disks• Read and identify core dump messages• Consider physical environment and security

Hardware Updating Best Practices

• Expansion boards• Kudzu and Linux hardware• Memory and peripheral upgrade procedures• Replacing and maintaining a hard disk

ResourceConflicts

• Common symptoms of device conflicts• Troubleshooting tools• Troubleshooting cables• Attenuation

IncreasingSwap Space

• Additional swap commands• The mkswap command• Creating a swap file

FaultTolerance Options

• Hot swapping• Uninterruptible power supply (UPS)• RAID

Troubleshooting theLinux Boot Process

• Booting into single mode• Using Linux interactive mode• Using a boot floppy disk or the installation CD as a

rescue disk• Obtaining a copy of the boot sector and restoring

it to the hard drive• Core dumps

The Linux System's Physical Environment

• Ventilation and temperature• Humidity• Water• Dust• Magnetic fields

SystemSecurity Issues

• Locked doors• Password-protected screen savers• Secure removable drives and drive ports• Unused logon accounts• Shadow utilities• Monitor log files

Summary

Describe software and hardware troubleshooting best practices

Identify when to increase swap space Identify boot failure messages List options for providing fault tolerance Fix systems with system boot disks Read and identify core dump messages Consider physical environment and security

Linux+

Linux Characteristics and Features Preparing for Installation Installing Linux Navigating the System Using Vi An Arsenal of Linux Commands Customizing the Linux Logon Environment

Linux+

User Management Managing Packages and Shared Libraries Managing Run Levels I/O Redirection, Variables and Shell Scripts Managing Processes and System Elements Managing the Hard Drive The Kernel, Modules and Customizing the Boot

Process Networking with Linux

Linux+

Linux and Dial-up Access The X-Window Environment Printing in Linux Archiving and Restoring Maintaining and Troubleshooting Linux