Updated: 2014-03-09 12:20 EDT
touch
cat, more, less
head, tail
mkdir
mv
(including using ..
)cp
rm, rmdir
find
.bash_history
fileCheck the due date for each assignment and put a reminder in your agenda, calendar, and digital assistant.
The worksheets are available in four formats: Open Office (ODT), PDF, HTML, and Text. Only the Open Office format allows you “fill in the blanks” in the worksheet. The PDF format looks good but doesn’t allow you to type into the blanks in the worksheet. The HTML format is crude but useful for quick for viewing online.
Do NOT open the ODT files using any Microsoft products; they will mangle the format and mis-number the questions. Use the free Libre Office or Open Office programs to open these ODT documents. On campus, you can download Libre Office here.
Review last week. Did you do everything assigned last week?
Take notes in class! Your in-class notes would go here.
Turn on “show file extensions” in Windows! No more file.txt.txt
please.
cd
Finish off absolute and relative pathnames.
GLOB patterns match file names.
As of Sunday the following students have not Read All The Words in Assignment 1 and will not be getting marks:
xxxxxxxx: Bad file name: assignment01.txt.txt
xxxxxxxx: Text found in Blackboard submisssion box (ignored)
xxxxxxxx: Bad file name: assignment.txt
xxxxxxxx: Bad file name: Assignment 1.txt
xxxxxxxx: Text found in Blackboard submisssion box (ignored)
UK’s security branch says Ubuntu most secure end-user OS: “while no end-user operating system is as secure as they’d like it to be, Ubuntu 12.04 is the best of the lot.”
Quebec creates a new Centre of Expertise in Free/Open Source Software
UK Government now has a clear preference for open source software:
Use open source software in preference to proprietary or closed source alternatives, in particular for operating systems, networking software, Web servers, databases and programming languages.
Problems which are rare, or specific to a domain may be best answered by using software as a service, or by installing proprietary software. In such cases, take care to mitigate the risk of lock-in to a single supplier by ensuring open standards are available for interfaces.
For unique needs and common problems which have yet to be solved well elsewhere, develop software by coding in the open and publish under an open source licence.
http://www.computerweekly.com/news/2240179643/Government-mandates-preference-for-open-source
I log attacks on my machines. I compared the yesterday attack logs from home (TekSavvy – hit by 32 attack addresses) and my school desktop machine (Algonquin – hit by 50 attack addresses) and found three common attack addresses, two in China and one in India. These three addresses tried to use an SSH login to both my home and my Algonquin machines. Should I worry?
117.21.127.215
196.214.iconpln.net.id
214.51.174.61.dial.wz.zj.dynamic.163data.com.cn
From China:
$ whois 117.21.127.215
netname: CHINANET-JX
descr: CHINANET Jiangxi province network
descr: China Telecom
descr: No.31,jingrong street
descr: Beijing 100032
$ whois 163data.com.cn
Domain Status: inactive
Registrant: 中国电信集团公司
Registrant Contact Email: domain@chinatelecom.com.cn
Sponsoring Registrar: 北京万网志成科技有限公司