Free Essay

Linux Directory Structure Definitions

In:

Submitted By J78Smith
Words 578
Pages 3
1. / – Root * Every single file and directory starts from the root directory. * Only root user has write privilege under this directory. * Please note that /root is root user’s home directory, which is not same as /.
2. /bin – User Binaries * Contains binary executables. * Common linux commands you need to use in single-user modes are located under this directory. * Commands used by all the users of the system are located here. * For example: ps, ls, ping, grep, cp.
3. /sbin – System Binaries * Just like /bin, /sbin also contains binary executables. * But, the linux commands located under this directory are used typically by system aministrator, for system maintenance purpose. * For example: iptables, reboot, fdisk, ifconfig, swapon
4. /etc – Configuration Files * Contains configuration files required by all programs. * This also contains startup and shutdown shell scripts used to start/stop individual programs. * For example: /etc/resolv.conf, /etc/logrotate.conf
5. /dev – Device Files * Contains device files. * These include terminal devices, usb, or any device attached to the system. * For example: /dev/tty1, /dev/usbmon0
6. /proc – Process Information * Contains information about system process. * This is a pseudo filesystem contains information about running process. For example: /proc/{pid} directory contains information about the process with that particular pid. * This is a virtual filesystem with text information about system resources. For example: /proc/uptime
7. /var – Variable Files * var stands for variable files. * Content of the files that are expected to grow can be found under this directory. * This includes — system log files (/var/log); packages and database files (/var/lib); emails (/var/mail); print queues (/var/spool); lock files (/var/lock); temp files needed across reboots (/var/tmp);
8. /tmp – Temporary Files * Directory that contains temporary files created by system and users. * Files under this directory are deleted when system is rebooted.
9. /usr – User Programs * Contains binaries, libraries, documentation, and source-code for second level programs. * /usr/bin contains binary files for user programs. If you can’t find a user binary under /bin, look under /usr/bin. For example: at, awk, cc, less, scp * /usr/sbin contains binary files for system administrators. If you can’t find a system binary under /sbin, look under /usr/sbin. For example: atd, cron, sshd, useradd, userdel * /usr/lib contains libraries for /usr/bin and /usr/sbin * /usr/local contains users programs that you install from source. For example, when you install apache from source, it goes under /usr/local/apache2
10. /home – Home Directories * Home directories for all users to store their personal files. * For example: /home/john, /home/nikita
11. /boot – Boot Loader Files * Contains boot loader related files. * Kernel initrd, vmlinux, grub files are located under /boot * For example: initrd.img-2.6.32-24-generic, vmlinuz-2.6.32-24-generic
12. /lib – System Libraries * Contains library files that supports the binaries located under /bin and /sbin * Library filenames are either ld* or lib*.so.* * For example: ld-2.11.1.so, libncurses.so.5.7
13. /opt – Optional add-on Applications * opt stands for optional. * Contains add-on applications from individual vendors. * add-on applications should be installed under either /opt/ or /opt/ sub-directory.
14. /mnt – Mount Directory * Temporary mount directory where sysadmins can mount filesystems.
15. /media – Removable Media Devices * Temporary mount directory for removable devices. * For examples, /media/cdrom for CD-ROM; /media/floppy for floppy drives; /media/cdrecorder for CD writer
16. /srv – Service Data * srv stands for service. * Contains server specific services related data.

Similar Documents

Premium Essay

Linux Users, Groups, Files, and Directories

...this is my first foray into Linux I had no idea what to write about in relation to being a Unix Administration. After looking at the topics I chose “configuration of users, group, and file/directory permissions for several reasons. The first is that I did spend some time many years ago setting up an active directory infrastructure so I am hoping to relate how to set up users in Linux to mirror that structure; if that is at all possible. The second reason is that one of the first thing an server administrator would have to do after booting and loading a file system would be to define permissions’ to allow people to get access to either the application or data on the server. I suspect that a lot of thought would have to be put into doing this, if it is not done correctly it will be ad hoc or have to be redone multiple times to get it right. Having to redo it might require all of the users to lose access while it is being redone. I think explaining how to set up the file/directory permissions relating to the access capabilities of the user/groups will also be interesting to learn. Finally the other reason that I chose this topic is that it has the most words so I in my thinking if it took that long to describe the topic hopefully there will be enough material to fill up a research paper. My goal in doing the research is to gain an understanding on these topics and pass that information on to anyone that is as clueless as I currently am on Linux. I will accomplish this by...

Words: 1954 - Pages: 8

Premium Essay

File Management Pos-355

...the storage medium, and the order of those sector that make up the file. It is important that the file manager work with the device manager and use effective algorithms for the read and write of files. The file manager also gives or denies access to files by users or programs. The file manager also is in cooperation with the process manager to allocate or de-allocate files to the processor. The last task is that the file manager provides easy commands that assist users and/or programs in file handling (Gallert, 2000) . Unix/Linux File Management UNIX/Linux uses the distinction of inodes to refer to files or segments of files on the system and uses pointers to indicate where the files are on the storage media. There are some slight differences between each version of Unix/Linux but we will not go into those differences in this paper and will only cover the basics of file management. No matter what version of Unix/Linux is being used the file structure and permissions do seem to be consistent with one another. The use of inodes acts as a key or represents the file as a whole. So if there are 10 inodes then that means that they are all representing one file. The inode also represents any attributes that those files may have. The inode has file permissions, location, and where the file is on the storage media (Stallings, 2012). Each inode could have many descriptions of...

Words: 2096 - Pages: 9

Free Essay

Linux

...LINUX PROGRAMMING FINAL NOTES UNIT 1ST THESE NOTES ARE AS PER SYLLABUS & WILL HELP YOU TO ACHIEVE SUCCESS IN FINAL EXAM OF MCA 5TH SEMESTER. LETS START: UNIT 1ST Linux – The Operating System: Linux is one of popular version of UNIX operating System. It is open source as its source code is freely available. It is free to use. Linux was designed considering UNIX compatibility. It's functionality list is quite similar to that of UNIX. Linux is a free distributed implementation of a Unix-like Kernel Developed by Linus Torvalds at the University of Helsinki with the help of programmers across the Internet. Linux history: * Linux features: Following are some of the important features of Linux Operating System. * Portable - Portability means softwares can works on different types of hardwares in same way.Linux kernel and application programs supports their installation on any kind of hardware platform. * Open Source - Linux source code is freely available and it is community based development project. Multiple teams works in collaboration to enhance the capability of Linux operating system and it is continuously evolving. * Multi-User - Linux is a multiuser system means multiple users can access system resources like memory/ ram/ application programs at same time. * Multiprogramming - Linux is a multiprogramming system means multiple applications can run...

Words: 6867 - Pages: 28

Premium Essay

Evolution of the Universe

...UNIX, Linux, Mac, and Windows OS Comparison Paper B. James Bryant UNIX, Linux, Mac, and Windows OS Comparison In 1956, General Motors produced the first OS for its IBM 704 series mainframe. Since then companies around the world, both big and small, have been tirelessly researched, testing, and releasing newer and faster operating systems for the world to use. Among these are systems developed by/for UNIX, Linux, Microsoft, and Apple. In fact, it’s safe to say that these four companies have a monopoly on all current technology used in both the military, corporate, and private sectors all around the world. UNIX Operating System Unix operating systems have the ability to be multi-user, multi-tasking and portable. Multi-user capabilities are accomplished through time sharing which means the processor allocates slices of time to first one process and then the next, sharing the available time in sequence with waiting processes (Nagpal, 2009). Unix can run in either command line interface, CLI, or graphic user interface or GUI mode. A key and unique feature of Unix is that it has a modular design which allows parts of the system to be added or removed without affecting performance of the other parts making Unix systems highly customizable. Unix operating systems have four core components, (1) the kernel, (2) the shell, (3) the file system, and (4) the utilities or tools and applications (Love et al, 2005). The kernel is the lowest layer of the operating system that...

Words: 5010 - Pages: 21

Free Essay

Linux System Programming

...LINUX System Programming Other Linux resources from O’Reilly Related titles Building Embedded Linux Systems Designing Embedded Hardware Linux Device Drivers Linux Kernel in a Nutshell Programming Embedded Systems Running Linux Understanding Linux Network Internals Understanding the Linux Kernel Linux Books Resource Center linux.oreilly.com is a complete catalog of O’Reilly’s books on Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web platform: Linux, Apache, MySQL and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in documenting the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online reference library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or simply flip to the page you need. Try it today for free. LINUX System Programming Robert Love Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux System Programming by Robert Love Copyright...

Words: 125679 - Pages: 503

Free Essay

Microprocessor

...TECHONOLOGY FILE SYSTEM * ntfs * hpfs * ntfs 5.0 * mft * REDUNDANT ARRAY OF INDEPENDENT DISKS * raid * raid 0 * raid 1 * raid 3 * raid 5 * raid 10 * raid 30 and 50 * EXTENDED FILE SYSTEM * -ext 2 * -ext 3 * -linux swap * CONCLUSION * REFERENCES File System Definition: Computers use particular kinds of file systems to store and organize data on media, such as a hard drive, the CDs, DVDs, and BDs in an optical drive or on a flash drive. Any place that a PC stores data is employing the use of some type of file system. A file system can be thought of as an index or database containing the physical location of every piece of data on a hard drive. A file system is setup on a drive during a format. 1) In a computer, a file system (sometimes written filesystem) is the way in which files are named and where they are placed logically for storage and retrieval. The DOS, Windows, OS/2, Macintosh, and UNIX-based operating systems all have file systems in which files are placed somewhere in a hierarchical (tree) structure. A file is placed in a directory (folder in Windows) or...

Words: 14273 - Pages: 58

Free Essay

Red Hat

...year student of Computer Science at the University of Helsinki, developed the preliminary kernel of Linux, known as Linux version 0.0.1 Free software, as defined by the FSF (Free Software Foundation), is a "matter of liberty, not price." To qualify as free software by FSF standards, you must be able to: Run the program for any purpose you want to, rather than be restricted in what you can use it for. View the program's source code. Study the program's source code and modify it if you need to. Share the program with others. Improve the program and release those improvements so that others can use them. Red Hat Linux : One of the original Linux distribution. The commercial, nonfree version is Red Hat Enterprise Linux, which is aimed at big companies using Linux servers and desktops in a big way. (NJIT) Free version: Fedora Project. Debian GNU/Linux : A free software distribution. Popular for use on servers. However, Debian is not what many would consider a distribution for beginners, as it's not designed with ease of use in mind. SuSE Linux : SuSE was recently purchased by Novell. This distribution is primarily available for pay because it contains many commercial programs, although there's a stripped-down free version that you can download. Mandrake Linux : Mandrake is perhaps strongest on the desktop. Originally based off of Red Hat Linux. Gentoo Linux : Gentoo is a specialty distribution meant for programmers. A runlevel is a software configuration...

Words: 7097 - Pages: 29

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...

Words: 228961 - Pages: 916

Premium Essay

Teradata 12 Release Summary

...of Teradata Corporation or its affiliates. Adaptec and SCSISelect are trademarks or registered trademarks of Adaptec, Inc. AMD Opteron and Opteron are trademarks of Advanced Micro Devices, Inc. BakBone and NetVault are trademarks or registered trademarks of BakBone Software, Inc. EMC, PowerPath, SRDF, and Symmetrix are registered trademarks of EMC Corporation. GoldenGate is a trademark of GoldenGate Software, Inc. Hewlett-Packard and HP are registered trademarks of Hewlett-Packard Company. Intel, Pentium, and XEON are registered trademarks of Intel Corporation. IBM, CICS, RACF, Tivoli, z/OS, and z/VM are registered trademarks of International Business Machines Corporation. Linux is a registered trademark of Linus Torvalds. LSI and Engenio are registered trademarks of LSI Corporation. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are registered trademarks of Microsoft Corporation in the United States and other countries. Novell and SUSE are registered trademarks of Novell, Inc., in the United States and other countries. QLogic and SANbox trademarks or registered trademarks of QLogic Corporation. SAS and SAS/C are trademarks or registered trademarks of SAS Institute Inc. SPARC is a registered trademarks of SPARC International, Inc. Sun Microsystems, Solaris, Sun, and Sun Java are trademarks or registered trademarks of Sun Microsystems, Inc., in the...

Words: 18345 - Pages: 74

Free Essay

Re: Target Jbims.. Dream Team 2012.. Do You Have It in You...

...Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions& concurrency control: Transactions, nested transactions, locks, optimistic concurrency control, time stamp ordering (12.1-12.7 of Text1) ..8hrs 7. Distributed Transactions: Introduction, Flat and nested...

Words: 5050 - Pages: 21

Free Essay

Sfdas Fsaf

...part on the “kernel” protocol stack 1 Aside on compiling programs in linux: To compile a program in Linux (not using make) for example the program intro/byteorder.c on p. 78 gcc byteorder.c This places the executable in a default file a.out gcc -o byteorder byteorder.c Places executable in byteorder ; can run by . / byteorder 2 Linux Configuration Tip: Instead of having to type . / program every time you run a “program” what you can do is in .bash_profile in your /root directory add to the path line. Path = . : Add this Now you can just type program instead of ./program since . is now included in your path (From a security standpoint this is a bad thing to do, thus it is not already there for you.) On another Linux subject: To switch from one default text login screen to another (not in the graphics GUI x windows) Alt Alt Alt etc 3 } F1 F2 F3 Default screen A second screen A third screen Now Figure 2.18 page 61 4 Example: a simple daytime client: What this example client program does is connect to a server and gets the date and time if we run: . / daytimetcpcli reachable_IP_address for example: 127.0.0.1 Gets date & time back printed out on screen (However this will not run unless we have a daytime server running on port 13. We can do this by using server code later in this lecture or by in a config file turning on the daytime daemon which is off by default in our linux install.) Details: Line 1 : Includes a bunch on code (unp.h) in appendix...

Words: 1951 - Pages: 8

Free Essay

Android Based Webstatic Server

...WEBSERVER BY CONTENTS TITLE ABSTRACT INTRODUCTION…………………………………………………. 1 Purpose……………………………………………………..………… 1.1 Scope…………………………………………………..…….……….. 1.2 Definitions, Acroynms, Abbrivations……………………. 1.3 Overview……………………..………………………………………. 1.4 SYSTEM ANALYSIS……………………………………… 3 Software Requirements Specification…..………………. 3.1 Hardware Requirements……………………………………….. 3.1.1 Software Requirements………………………………………… 3.1.2 IMPLEMENTATION……………………………………… 4 Modules……………………………………………………………….. 4.1 Accounts…………………………………………………………..4.1.1 Transactions………………………………………………………….. 4.1.2 DESIGN………………..…………………………….……… 5 UML Diagrams………………………………………………………… 5.1 Class Diagram………………………………………………………… 5.1.1 Usecase Diagram….……………………………………………….. 5.1.2 Sequence Diagram….……………………………………………….. 5.1.3 RESULT FOR IMPLEMENTATION…………………… 6 Output Screens………………………………………………………. 6.1 SYSTEM TESTING………………………………………….7 Types of Testing………………………………………………………. 7.1 TESTCASES…………………………………………………..8 CONCLUSION………………………………………………..9 ANDROID BASED STATIC WEBSERVER ABSTRACT Android is software platform and operating system for mobile devices. Being an open-source, it is based on the Linux kernel. It was developed by Google and later the Open Handset Alliance (OHA). It allows writing managed code in the Java language. Due to Android here is the possibility to write applications in other languages...

Words: 9090 - Pages: 37

Free Essay

Cis 126 Quiz1 Ch 1-2

...GNOME is a terminal emulation program. __F__ 5. Logic refers to a command's format and wording, as well as the options and arguments you can use to extend and modify its functions. __T__ 6. You use the cat command to combine two files and redirect the output to other files. ___T_ 7. Some versions of UNIX include the umask command which enables you to set permissions on multiple files at one time. ___F_ 8. You can use the com command to combine two files and redirect the output. __T__ 9. The tilda (~) is used to represent the home directory when copying files. __F__ 10. The asterisk (*) symbol of a wildcard can ONLY take the place of a single character. __F__ 11. To list hidden files in your home directory, you can use the ls -h command. __T__ 12. The figure shown above represents the contents of the /directory. ___T_ 13. UNIX interprets two consecutive dots to mean the parent directory. ____ 14. A path that takes a shorter journey is referred to as a virtual path. ____ 15. In the Bash shell prompt, the \] marks the end of a sequence of non-printed characters. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true. ____ 16. The whatis command...

Words: 1794 - Pages: 8

Premium Essay

Lg C Program

...About The Tutorial C is a general-purpose, procedural, imperative computer programming language developed in 1972 by Dennis M. Ritchie at the Bell Telephone Laboratories to develop the UNIX operating system. C is the most widely used computer language. It keeps fluctuating at number one scale of popularity along with Java programming language, which is also equally popular and most widely used among modern software programmers. Audience This tutorial is designed for software programmers with a need to understand the C programming language starting from scratch. This tutorial will give you enough understanding on C programming language from where you can take yourself to higher level of expertise. Prerequisites Before proceeding with this tutorial, you should have a basic understanding of Computer Programming terminologies. A basic understanding of any of the programming languages will help you in understanding the C programming concepts and move fast on the learning track. Copyright & Disclaimer  Copyright 2014 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the...

Words: 13419 - Pages: 54

Premium Essay

Test

...This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10