
XK0-004: CompTIA Linux+ Certification Video Training Course
The complete solution to prepare for for your exam with XK0-004: CompTIA Linux+ certification video training course. The XK0-004: CompTIA Linux+ certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including CompTIA Linux+ XK0-004 exam dumps, study guide & practice test questions and answers.
XK0-004: CompTIA Linux+ Certification Video Training Course Exam Curriculum
Course Introduction
-
1. Course Introduction 1
-
2. Course Introduction 2
-
3. Instructor Introduction
Unit 01 - Installation
-
1. Installation
-
2. Topic A: Linux Introduction
-
3. Ubuntu with OpenOffice / Firefox
-
4. Linux Platforms
-
5. Popular Distros Part
-
6. Popular Distros Part
-
7. Software Licensing Part
-
8. Software Licensing Part
-
9. Non-licensing Terminology
-
10. Demo - Exploring Linux and Licensing
-
11. Topic B: Pre-installation Tasks Part
-
12. Pre-installation Tasks Part
-
13. Pre-installation Tasks Part
-
14. Pre-installation Tasks Part
-
15. Installation Types
-
16. Installation Files
-
17. ISO Burning Applications
-
18. Topic C: Linux Installation
-
19. File Systems
-
20. Partitioning
-
21. Minimum Partitions
-
22. Demo - Installing Linux
-
23. Logging On
-
24. Demo - Logging into Debian
-
25. Unit 01 Review
Unit 02 - Using Linux
-
1. Using Linux
-
2. Topic A: Graphical User Interfaces
-
3. User Interface Architecture
-
4. User Interface Architecture (Cont.)
-
5. Demo - Exploring User Interfaces
-
6. Desktop Environments
-
7. GNOME
-
8. GNOME Environment
-
9. KDE
-
10. Xfce
-
11. Linux Applications
-
12. Demo - Exploring End -user Applications and OpenOffice Writer
-
13. Topic B: Command Line Linux
-
14. Command Line Interface
-
15. BASH (Bourne Shell)
-
16. Common Commands
-
17. Demo - Entering Commands at the BASH Prompt
-
18. BASH Proficiency
-
19. Command History
-
20. Shell Variables
-
21. Shell Metacharacters
-
22. Tab Completion
-
23. Demo - Exploring the BASH Command Line Interface
-
24. Piping
-
25. Piping and Redirecting
-
26. Standard I/O
-
27. Demo - Exploring Piping and Redirection
-
28. Named Pipes
-
29. Demo - Exploring Named Pipes
-
30. Getting Help
-
31. Man Page
-
32. Man Page Sections
-
33. Info Pages
-
34. Demo - Getting Help
-
35. Additional Help Options
-
36. Demo - Exploring Further Help Options
-
37. Unit 02 Review
Unit 03 - File and Directory Management
-
1. File and Directory Management
-
2. Topic A: Directory Organization
-
3. Filesystem Hierarchy Standard Part1
-
4. Filesystem Hierarchy Standard Part2
-
5. Directory
-
6. pushd and popd
-
7. Demo - Exploring the FHS Directories
-
8. Managing Directories
-
9. Demo - Managing Directories
-
10. Topic B: File Management
-
11. Files - Part
-
12. Files - Part
-
13. Wildcards
-
14. Demo - Managing Files
-
15. The vi Editor
-
16. vi Commands
-
17. Demo - Editing a File with vi
-
18. Links
-
19. Demo - Creating and Using File Links
-
20. File Information Commands
-
21. File Info with ls -l
-
22. More File Information Commands
-
23. Demo - Examining File Types
-
24. Finding Files
-
25. Demo - Finding Files
-
26. Topic C: Removable Storage
-
27. Mounting Volumes
-
28. File System Types
-
29. Device Files
-
30. Mount Points
-
31. Mount Options
-
32. Example Commands
-
33. Mounting
-
34. Privilege Escalation
-
35. Demo - Mounting and Unmounting a CD and USB Drive
-
36. Unit 03 Review
Unit 04 - System Administration
-
1. System Administration
-
2. Topic A: Users and Groups
-
3. User Security - /etc/passwd
-
4. Password File Fields
-
5. User Security - /etc/shadow
-
6. Shadow File Fields
-
7. Privilege Escalation
-
8. Demo - Exploring User Accounts
-
9. Demo - Adding Your Account to the sudoers File
-
10. User Accounts
-
11. The /etc/login.defs File
-
12. The /etc/default/useradd File
-
13. The /etc/skel Directory
-
14. The adduser Command
-
15. The /etc/adduser.conf File
-
16. Demo - Creating User Accounts at the Command Line
-
17. GUI Admin Tools
-
18. Demo - Creating User Accounts via the GUI
-
19. Modifying Users
-
20. The chfn Command
-
21. The finger Command
-
22. Demo - Modifying a User Account
-
23. Creating Groups
-
24. Adding Users to Groups
-
25. Demo - Creating Groups and Adding Members
-
26. Deleting Accounts
-
27. Demo - Deleting Users and Groups
-
28. Topic B: File and Directory Permissions
-
29. File Ownership
-
30. Managing File Ownership
-
31. File and Directory Permissions / Files Ownership
-
32. Demo - File and Directory Permissions
-
33. Files and Directory Permission
-
34. The Mode
-
35. Mode Explained
-
36. Demo - Viewing File Permissions
-
37. Changing Permissions
-
38. Numeric Syntax
-
39. Default Permissions
-
40. Demo - Changing File Permissions
-
41. Directory Permissions
-
42. Umask
-
43. Demo - Viewing and Changing the Umask
-
44. Special Permissions
-
45. Special Permissions in the Mode
-
46. Setting Special Permissions
-
47. Demo - Viewing and Changing Special Permissions
-
48. File System Specific Attributes
-
49. Demo - Viewing and Changing ext3 File Attributes
-
50. Topic C: User Environment Configuration
-
51. Variables
-
52. Viewing Variables, Custom Variables
-
53. Custom Variables
-
54. Changing the Prompt
-
55. Prompt
-
56. Demo - Working with Shell and Environment Variables
-
57. Command Aliases Part
-
58. Command Aliases Part
-
59. Demo - Viewing and Creating Command Aliases
-
60. Environment Files
-
61. Demo - Saving a Command Alias in an Environment File
-
62. Topic D: GUI Configuration
-
63. Video Configuration
-
64. Screen Resolution
-
65. xvidtune
-
66. Screensaver
-
67. Appearance Preferences
-
68. Demo - Configuring Video Settings
-
69. Mouse Preferences
-
70. Keyboard Preferences
-
71. Demo - Configuring the Mouse and Keyboard
-
72. Stop and Start X Windows
-
73. Demo - Stopping and Starting X Windows
-
74. Unit 04 Review
Unit 05 - Application Management
-
1. Application Management
-
2. Topic A: Packages and Package Managers
-
3. Software Distribution Part
-
4. Softwarre Distribution Part
-
5. Software Distribution Part
-
6. Packages
-
7. Package Managers
-
8. Synaptic Package Manager
-
9. Demo - Installing a Package via the GUI
-
10. Command Line Package Managers
-
11. Demo - Installing a Package via the Command Line
-
12. Installed Software
-
13. Demo - Gathering Information about Installed Software
-
14. Removing Software
-
15. Demo - Removing Software
-
16. Repositories
-
17. Synaptic - Software Sources
-
18. Demo - Managing Repositories
-
19. Topic B: Source Code Software
-
20. Installing from Source Code
-
21. Extracting
-
22. Compiling and Linking
-
23. Installing and Cleaning Up
-
24. Demo - Installing the GNU C Compiler
-
25. Demo - Downloading and Installing a Source Code Application
-
26. Unit 05 Review
Unit 06 - System Configuration
-
1. System Configuration
-
2. Topic A: Disk Management
-
3. Disk Drives
-
4. Drive Components Part
-
5. Drive Components Part
-
6. Drive components Part
-
7. Drive Geometry
-
8. Partitioning
-
9. fdisk
-
10. fdisk - Drive and Partition List
-
11. parted - Partition Editor
-
12. GParted
-
13. Demo - Exploring Partitions with fdisk
-
14. Demo - Exploring Partitions via the GUI
-
15. Formatting
-
16. Demo - Formatting a Partition with mkfs
-
17. The /etc/fstab File
-
18. The fstab with New Drives
-
19. Demo - Editing the fstab File
-
20. Virtual File Systems
-
21. Demo - Mounting a Loop Device
-
22. Topic B: File System Management
-
23. Quotas
-
24. Quotas Enabled in fstab
-
25. Enabling Quotas
-
26. Editing Quotas with edquota
-
27. Enabling Quotas (cont.)
-
28. Swap Space
-
29. Swap Space Options
-
30. Creating Swap Space
-
31. Filling New Swap Space
-
32. Managing Swap
-
33. Demo - Managing Swap Space
-
34. Disk Arrays
-
35. RAID Level
-
36. RAID Level
-
37. RAID Level
-
38. RAID Level
-
39. Logical Volume Manager
-
40. Implementing LVM
-
41. Topic C: Device Management
-
42. Devices
-
43. Sample Devices
-
44. Demo - Exploring the /dev Directory
-
45. Viewing USB Devices
-
46. Demo - Viewing Devices on the USB Bus
-
47. Viewing PCI Devices
-
48. Unit 06 Review
Unit 07 - Process and Module Management
-
1. Topic A: Process Management
-
2. Process Management
-
3. Processes Part
-
4. Processes Part
-
5. Process IDs Part
-
6. Process IDs Part
-
7. Demo - Exploring Processes
-
8. The ps Command
-
9. Common ps Command Forms Part
-
10. Common ps Command Forms Part
-
11. Output of ps aux
-
12. The top Command
-
13. Demo - Viewing Processes and Devices
-
14. Killing Processes
-
15. Other kill Commands
-
16. Demo - Managing Processes
-
17. Topic B: Process Priority and Execution
-
18. Process Forking
-
19. Foreground and Background
-
20. Demo - Comparing Foreground and Background Processes
-
21. Process Priority
-
22. Viewing Priorities
-
23. Setting Priorities
-
24. Renice
-
25. Demo - Managing Process Priorities
-
26. Topic C: Kernel Modules
-
27. Kernel
-
28. Kernel Tuning
-
29. Common sysctl Settings
-
30. Demo - Viewing Kernel Information
-
31. Kernel Modules Part
-
32. Kernel Modules Part
-
33. The lsmod Command
-
34. The modprobe Command
-
35. Module Related Files
-
36. Demo - Exploring Kernel Modules
-
37. Unit 07 Review
Unit 08 - System Maintenance
-
1. System Maintenance
-
2. Topic A: Backup and Restore
-
3. Compression Part
-
4. Compression Part
-
5. Algorithms Part
-
6. Algorithms Part
-
7. Compressed File Types
-
8. Compression Utilities
-
9. GNU zip = gzip
-
10. bzip
-
11. Compression via the GUI
-
12. Demo - Compressing and Extracting Data
-
13. Tape Archives Part
-
14. Tape Archives Part
-
15. Demo - Creating Archiving with tar
-
16. cpio and find
-
17. Demo - Backing Up with cpio
-
18. Backup with dd Part
-
19. Backup with dd Part
-
20. Demo - Backing Up with dd
-
21. Topic B: Scheduling Tasks
-
22. Scheduling Commands
-
23. The at Command
-
24. Demo - Scheduling Commands with at
-
25. The cron Command
-
26. Sample crontab
-
27. crontab run - parts Format
-
28. Managing cron
-
29. Demo - Scheduling a Job with cron
-
30. Topic C: Performance Monitoring
-
31. Monitoring Tools
-
32. Demo - Installing the sysstat Package
-
33. mpstat
-
34. iostat
-
35. Demo - Monitoring with mpstat and iostat
-
36. System Activity Reporter
-
37. Output of sar
-
38. Demo - Monitoring System Activity with sar
-
39. The uptime Command
-
40. The free Command
-
41. The top Command
-
42. The vmstat Command
-
43. Demo - Using the Memory Statistics Utilities
-
44. Load Average
-
45. Demo - Viewing the Load Average for Your Computer
-
46. Topic D: Logging
-
47. Log Files
-
48. Demo - Viewing Logs
-
49. System Logging Daemon
-
50. Sample rsyslog.conf
-
51. Logging Facilities
-
52. Priorities
-
53. Priority Notation
-
54. Demo - Examining the syslog.conf File
-
55. Log Rotation
-
56. Sample logrotate.conf
-
57. Demo - Examining Log Rotation
-
58. Text Manipulation Commands Part
-
59. Text Manipulation Commands Part
-
60. grep
-
61. head and tail sed
-
62. Sed
-
63. Demo - Searching and Displaying Text Files
-
64. awk Part
-
65. awk Part
-
66. Demo - Searching and Replacing with awk
-
67. Unit 08 Review
Unit 09 - Networking
-
1. Networking
-
2. Topic A: Networking Basics
-
3. Networks
-
4. Protocols
-
5. OSI Reference Model Part1
-
6. OSI Reference Model Part2
-
7. OSI Reference Model Part3
-
8. OSI Reference Model Part4
-
9. OSI Reference Model Part5
-
10. OSI Reference Model Part6
-
11. OSI Reference Model Part7
-
12. Internet Protocol Suite
-
13. Additional Protocols
-
14. Addressing
-
15. Addresses
-
16. Internet Protocol Version 4
-
17. Internet Protocol Version 6
-
18. Assigning Addresses
-
19. Demo - Examining Addresses
-
20. Character Based Names Part1
-
21. Character Based Names Part2
-
22. Name Utilities
-
23. Demo - Identifying Addresses and Names
-
24. Ports
-
25. Demo - Viewing an Using Ports
-
26. Authentication
-
27. Authentication Factors
-
28. One -factor Authentication
-
29. Two -factor Authentication
-
30. Three -factor Authentication
-
31. Topic B: Network Services
-
32. NIC Configuration
-
33. Network Commands
-
34. Demo - Configuring Your Network Interface
-
35. DHCP Service
-
36. Demo - Managing DHCP Client Services
-
37. DHCP Server Services
-
38. DHCP Server Services B
-
39. Demo - Installing and Configuring DHCP Server Services
-
40. Network Time Services
-
41. Date and Time Commands
-
42. Demo - Installing NTP and Configuring Time Synchronization
-
43. Internet Super Daemon
-
44. Demo - Viewing Daemon Startup Options
-
45. Topic C: Domain Name Services
-
46. DNS
-
47. Name Resolution Process
-
48. Demo - Resolving Names
-
49. BIND
-
50. Resource Records
-
51. Demo - Installing BIND and Examining its Configuration Files
-
52. Managing BIND
-
53. Demo - Managing BIND
-
54. Local Name Resolution
-
55. Default /etc/hosts File
-
56. The nssswitch.conf File
-
57. Demo - Examining Local Name Resolution
-
58. Unit 09 Review
Unit 10 - File Sharing and Printing
-
1. File Sharing and Printing
-
2. Topic A: Network File Resources
-
3. NFS
-
4. Demo - Enabling Local Name Resolution and Installing NFS
-
5. NFS Server Configuration
-
6. The exports File
-
7. Computer Entries
-
8. Options
-
9. Demo - Configuring and Starting the NFS Server
-
10. Mounting
-
11. Demo - Mounting an NFS File System
-
12. Managing NFS
-
13. Demo - Managing Exports
-
14. Topic B: Printing
-
15. Printing
-
16. LPD/LPR
-
17. Application Specific
-
18. CUPS
-
19. GUI Tools
-
20. More on Printing
-
21. Demo - Creating a Printer in CUPS
-
22. Printing Management
-
23. Demo - Managing Printers
-
24. Unit 10 Review
Unit 11 - Interoperability
-
1. Interoperability
-
2. Topic A: Network Interoperability
-
3. Samba
-
4. Demo - Installing Samba
-
5. Samba Configuration
-
6. The smb.conf File
-
7. SWAT
-
8. GUI Tools
-
9. Browsing for Linux Resources
-
10. Demo - Configuring Samba Shares
-
11. Topic B: Remote Desktop Access
-
12. rdesktop
-
13. rdesktop Command
-
14. GUI Clients
-
15. VNC
-
16. Debian’s VNC Server
-
17. TightVNC on Windows XP
-
18. A Linux Desktop on Windows
-
19. A Windows Desktop on Linux Part1
-
20. A Windows Desktop on Linux Part2
-
21. Unit 11 Review
Unit 12 - Security
-
1. Topic A: System Security
-
2. NIS
-
3. NIS Roles
-
4. PAM
-
5. LDAP
-
6. RADIUS
-
7. RADIUS B
-
8. RADIUS Benefits
-
9. SELinux - Security Enhanced
-
10. Changing Modes
-
11. Demo - Examining SELinux
-
12. User Tools
-
13. Demo - Exploring User Management Commands
-
14. Topic B: Network Security
-
15. Routing and Firewalls
-
16. Basic Routing Table
-
17. Routing
-
18. Large Network
-
19. Modifying Routing Tables
-
20. Demo - Examining Routing
-
21. Traffic Filtering and Marking
-
22. Configuring Chains and Rules
-
23. iptables Command Parameters
-
24. iptables Examples
-
25. Demo - Configuring iptables
-
26. Network Security Tools Part1
-
27. Network Security Tools Part2
-
28. Nessus
-
29. Intrusion Detection Systems
-
30. Snort IDS
-
31. HIDS
-
32. Unit 12 Review
Unit 13 - Web Environment
-
1. Web Environment
-
2. Topic A: Web Services
-
3. Web Technologies
-
4. Sample PHP Program
-
5. MySQL Client
-
6. Apache
-
7. Demo - Installing Apache
-
8. Apache Configuration Part 1
-
9. Apache Configuration Part 2
-
10. Site Definition Files Part 1
-
11. Site Definition Files Part 2
-
12. Site Definition Files Part 3
-
13. Site Definition Files Part 4
-
14. The .htaccess File Part 1
-
15. The .htaccess File Part 2
-
16. Demo - Configuring Apache
-
17. Apache Modules Part 1
-
18. Apache Modules Part 2
-
19. Apache Daemon
-
20. Demo - Installing the PHP Module
-
21. Demo - Configuring Apache’s Default Document
-
22. Topic B: MySQL Services
-
23. MySQL
-
24. Demo - Installing MySQL and Associated Tools
-
25. MySQL Configuration
-
26. Demo - Examining the MySQL Configuration Files
-
27. phpMyAdmin
-
28. Demo - Testing Your MySQL Server
-
29. Starting and Stopping MySQL
-
30. Demo - Starting and Stopping MySQL
Unit 14 - FTP and Email Services
-
1. FTP and Email Services
-
2. Topic A: FTP Services
-
3. FTP
-
4. Demo - Installing an FTP Server
-
5. Configuration
-
6. Demo - Configuring the FTP Server
-
7. Security
-
8. Security B
-
9. FTP Clients
-
10. Active Mode
-
11. Passive Mode
-
12. Transfer Types
-
13. Demo - Transferring Files with FTP
-
14. Secure FTP
-
15. SSH Daemon Configuration
-
16. key Generation B
-
17. Key Generation
-
18. Public Key Encryption
-
19. Demo - Installing and Configuring the SSH Daemon
-
20. Demo - Connecting via SSH
-
21. Synchronizing Directories
-
22. Topic B: Mail Services
-
23. Electronic Mail
-
24. Mail Clients
-
25. Email Addresses
-
26. Unit 14 Review
Unit 15 - Troubleshooting and Maintenance
-
1. Troubleshooting and Maintenance
-
2. Topic A: Booting Linux
-
3. Booting Linux
-
4. Booting
-
5. Boot Loaders
-
6. GRUB Boot Loader Screen
-
7. GRUB Configuration
-
8. Demo - Investigating GRUB
-
9. Runlevels
-
10. Runlevel Initialization
-
11. Demo - Changing Runlevels
-
12. Password Recovery
-
13. Root Password Recovery
-
14. Demo - Recovering the Root Password
-
15. Kernel Options and Recovery
-
16. Demo - Troubleshooting Boot Problems
-
17. Topic B: Network Troubleshooting
-
18. Troubleshooting
-
19. Network Utilities Part1
-
20. Network Utilities Part2
-
21. Obtaining Files
-
22. File Verification
-
23. Topic C: Scripting Basics
-
24. Scripting
-
25. A Script
-
26. Commands
-
27. Demo - Writing and Testing a Shell Script
-
28. Unit 15 Review
-
29. Course Closure
About XK0-004: CompTIA Linux+ Certification Video Training Course
XK0-004: CompTIA Linux+ certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Unit 03 - File and Directory Management
16. vi Commands
If you used the VI, you could edit or add commands, as I previously stated. Well, if the command or the letter A stood for the command "append," how did you know you didn't really want to type the letter A or you wanted to do "append"? Text commands always began with a cold. So you hit the colon. That meant append, or I for insert. If you needed to delete something, you were in the right place. Or you had several options with the colon D for deletion and control. Commands also work for you, as do methods to be able to deal with things.
You could yank or cut the file, paste it, undo it, and exit it. That means getting out of VI altogether. The Hjkl moved left, down, up, and right. And if you think about where they are on the keyboard, then it makes sense why they are the letters that they are. So these are just the commands we would use to navigate because, again, we didn't have a mouse. We couldn't just move the mouse, click on the word, and press C. We had to find a way to move up to navigate Hjkl, get to the location, and yank things. I mean, that's what we had to deal with. Often, if we wanted to delete a word or a letter, we would have to keep hitting the D key several times. Or you could do things like type "D5", and it would delete five things.
And now I'm really pulling these from memory because I don't have to use VI today. I guess I had a bad experience back in the old college days. I suppose one of those things I thought to myself was, "Oh, it's going to go away while it's still there." It's still very practical and very well used, especially in the routers and the PDAs and these little things that have embedded Unix-like programs, so, you know, I'm stuck with VI still. But anyway, you had those commands, and it didn't take long. It wasn't that hard. You just had to remember when you were typing in a letter for a text or when you were issuing a command. And don't forget, if you were performing a command and accidentally pressed D and typed the letter D, you only have yourself to blame, right?
17. Demo - Editing a File with vi
All right, we are going to use an editing programme called VI, which stands for Visual. And I'm going to open up a VI file, or, in a way, a new file called my VI file. And we're going to see why I like to nickname it "very irritating." So here we are. We're in a nice visual programme from 30, 40 years ago.
It looks like a command line. I realise the little tildes that you see along the left edge are not printable characters. That's just kind of a visual indicator to you that there's plenty of room for you to start typing whatever you wanted to type, going up and down. This editor at the bottom indicates that these are not printable characters. This last line is called your status bar. I know it doesn't look like a bar, but again, 30 or 40 years ago, that's what it was. MyVI file is a new file, according to what this says. And if I started trying to type something in here, as many of you are used to doing, I wouldn't get very far because you open up this thing in what's called command mode.
Now, I'm going to type or press the letter A. And when I did that, I got into append mode, and then I could actually start typing stuff in. So I'll just type in the quick Fox. Now, if I press the escape key, I'm going to leave my insert mode and go back to my command mode. I'm going to move my cursor back to the F in Fox. I'll then type the letter I for insert rather than append, because append means go to the end and here.
Then I'm going to type a red space. So I've got the red fox, I hit the escape key, and I'm back in command mode. Okay, so now that I've got that done, I'm going to move to the R in red. I'm going to say, "You know what?" That wasn't what I meant. So I want to delete the word "I'm in command mode." The delete command is the letter D, followed by the word command, which is the letter W. And just like that, you deleted the word. Yes. Believe it or not, that's how we did it 30 or 40 years ago. Now I'll type "I" once more to insert type in brown space. And there's my brown fox; press the escape key to exit edit mode. Okay, now I'm going to go to the very end of this command line.
And now that I'm at the very end, I'm going to type the letter A. Notice how it moved the cursor. because A is appended. I'm going to hit enter, and I'm going to type over or type the new one. I'm going to type "jump over the lazy dog." All right, so now that I've gotten that part of it done, I've got two lines now. I'm going to hit escape. So it takes me back into command mode, and I'm going to move my cursor back over to this little B here for the brown fox. And what I'm going to do, I don't know; maybe I want to start that line. I'll leave it there. I'm going to copy that word. I want to copy the word brown. In the world of VI, that is not called copy. It's called Yank. So I'm going to hit the letter Y for yank, followed by the letter W. And now I've just copied it. And I know you're probably saying, "Well, I didn't see that." Well, that's okay.
Let's see what happens if I try to put it back in a new spot. So I'm going to put it in front of the letter D. I'm going to type in the P for paste. And there you see, I just put it in the wrong spot. I didn't necessarily want to do that. So I'm going to hit you to undo my change. And now we're okay. So you can imagine that there are many more commands, and there really are many commands left. Let me hit escape to make sure I'm in command mode. There are commands to delete three whole lines if you want to. I mean, it just goes on and on with a lot of really cool stuff. So if you're not sure what commands to use and you want to work with VI, then you can get some online help. Use the manual pages. But I'm going to tell you my opinion only: you have text editors. This is a text editor. When I'm done with this, it will be a text file.
It was just what we had many, many years ago to be able to do this kind of editing that we didn't have before. Now I'm going to execute a command. I'm going to use the colon to execute a command. Now, the colon puts me down; if you didn't see it, down on the bottom left here in my command line, I'm going to type W to write or save my file and then Q to quit. I could have also just typed "WQ" to write it and quit. But just like that, I'm now out of myVi, so I do an LSL. You see that? I've got a file there called my VI file. If I say "cat myvi file," it shows itself to you right there on the screen. So that was VI. The visual editor that we have now was popular in the days of C++, which was a programming language. That was pretty much how we did everything in Unix environments. That's why, with all the new things, you can see why I like to have a nickname. It is very irritating because you have to memorise all those little tools. Anyway, it's a kind of archive, a history, and it's critical that you know it exists and how it works.
18. Links
Now one of the other things we look at with files is this idea of what we call links. Now, links are basically things that allow us to associate a name with an actual file. We'll start off by talking about this thing called inodes. Now, inodes are just metadata. Metadata would include what we call the message. Mace was an acronym that stood for modified, last accessed, created, or entered into the file system. The iNotes also contained the location of where a file was actually stored on a hard drive. It included ownership information as well about a particular file, so that actually had links to that information.
I knew it would. Hard links were another way of having an alternate name for the exact same file. That just meant that this hard link was named the same as this other file name. They both pointed to the exact same spot on the hard drive where this file was a symbolic or soft link, sometimes even called a SIM link. But a soft link was very much like a shortcut. It referenced a hard link or an actual file name and worked so long as you didn't move the actual file name. Then that link continued to work. So think of those like Windows shortcuts or your Macintosh aliases. Anyway, again, another method of working with files is by having these shortcuts or these links to the actual profiles themselves.
19. Demo - Creating and Using File Links
We're going to talk about creating links and doing so with a command line in our GUI. I'm going to start off again in the home directory of my user. My username is live user, and we're going to do the LS with the LF. So you can see what's currently here. I have two files. One is called "my non-empty file," but oddly enough, it's empty. And then this other one is called My File. So as a quick flashback, I'm going to rm the files that start with "My" and say, "Yes, let's get rid of those." And so now I feel pretty comfortable knowing that I have nothing but directories, and we verified that again with the LF, and I have just directories left.
Okay, so I'm going to clear this out. I'm going to use the T command. I'm going to create a file called Contact Info, and look, I'm going to put an extension on it. It doesn't really matter because this is Linux, and I'm going to say Ken Mayor and home, followed by Ken Mayor's work. Okay? So for all of you Hollywood types, you know that these five, five, five numbers don't exist, right? And I've included a couple of contact information, including the Kent Mayor's address, and let's make it a palace.
That's good. I've always wanted to live there, and I'll take care of Control C. We'll cat that file real quick so you can see what's on there, and I've got some contact information in that particular file.
Okay, now we'll try to make a hard link for this specific file, which we'll call MyHeartLink Text. And in doing that, to create the link, we're going to use the command Ln. Let us, in fact, do what is Ln. And if you notice, I remember again, in a little flashback, some of these things that help you learn how things work. It says Ln is a command that makes links between files. In fact, we can help, and we can see that we have a few options here. We can force the links and allow the superuser to create the hard link, the interactive mode. It can be a symbolic link instead of a hard link.
So this is important to know because with this option, it tells us in a way that we are making a hard link unless we turn on the S option. Okay? So let's clear our screen and we'll type in "Ln" and we're going to use the contact info and call it My Hard Link TXT. Now again, I use the "Complete" tab whenever at all possible. Now that I've made that link, LSL with a capital F, we can see my hardline text as well as the contact nfo text. All right, so I've got both of those, and I'm going to do a cat command on my hard link and notice how it basically links right over to the file contact information just like we said it would to the file contact info. Okay, now we're going to do another LN, this time with the dashes, as we know it's symbolic contact information. And we'll create a soft link called mylink, and I'll hit the enter key.
There is another LSL, with a capital F. Notice that this one no longer looks like the actual file but has an L for my soft link. And it tells you directly that it is softly linked to this contact information. Now if I actually moved contact information to another folder, this link would fail; it wouldn't work anymore. So here I'm going to count my links, and it gives me the same information. So that was a quick rundown of doing that through the command line. Now we're going to open up the "My Home" folder through our visual tools. I'll minimise this other one and maximise this; you can kind of see my link files in there, and what we're going to do is try to do something very similar to what we've had before.
Now if I double-click my contact information text, you can see that I can open it up in an editor, make a new edit, and I'm going to right-click this thing and click "make link." Now, I'm not going to take you through how I go about creating the files in the visual part. We've done that already; I don't like the name of it. So up on this thing here, I can hit F2 and make a change to the name if I don't like the way it reads. and I'm going to call it my visual link. I suppose that's as good as any because when I put the capital letters in there, I have to make sure I always type it in by that command so that it works because Linux is case sensitive, and just like that, I've got my case made. I was able to do that.
I did the right click and the make link, and you'll notice that when I created it, it had the same GUI as this soft link. So this is actually a soft link to the file, and now I'm going to take that and I'm going to actually drag that to my desktop. So now it's in a new location as far as where that symbolic link is going. And I'll close this down, and here is my link on my desktop, and I'm going to double-click it, and it opens up the text information that I would have expected it to open from the original location. Notice I moved the soft link, but I did not move the original file, so it's still linked to that original file. I just put it on my desktop, which is where most of you are probably used to seeing shortcuts in a Windows environment.
20. File Information Commands
Now there are many commands you can use to pull up information about a file. So let me go back to a statement I made earlier, which is that everything in Linux gets treated like a file. We don't have an executable. We have programmes that you can type into and they will launch and run. But when you look at them in the directory, there's no way you can say, "Oh, that's an executable, that's a document, that's a spreadsheet, that's a presentation." You cannot tell. Maybe the person who created the file gave it a very descriptive name.
Maybe they got used to the Windows way and added an extension for nothing more than just to change the name so it looks like something in particular. Great. However, there is no way to tell what type of file it is just by looking at the name. But there are commands that you can use to get the file information. The first is the LS command. Now the LS has a list function that will list the files and list details about the files, and you can see from there what type of file it is. You can use the file command. The file command, by entering the file's name, would describe the type of file, whether it was a file, a link, or some data; if it was a programme or executable, the stat command would be used. The stat would get information about the file, including its type, where it's stored, and all the other mace information you can use.
Test, which is not really a go, retrieve the file, and tell me what kind it is, but just a comparison test where you could say, "Test this file and tell me if it is a programme or if it is a file, and get the answer yes or no." So there are things you can do. Now, in lieu of remembering all those commands, Maybe it might be an idea—just an idea—to give it a naming convention so that you can look at the name of a file and actually be able to tell what kind of file it is from that naming convention. Now, I know not everybody wants to do that or is willing to go through that kind of painful exercise. So if you don't, you can still figure out the type by using one of these commands: ls, file, or stat.
Prepaway's XK0-004: CompTIA Linux+ video training course for passing certification exams is the only solution which you need.
Free XK0-004 Exam Questions & CompTIA XK0-004 Dumps | ||
---|---|---|
Comptia.test-king.xk0-004.v2022-12-16.by.lucy.192q.ete |
Views: 374
Downloads: 151
|
Size: 1.74 MB
|
Comptia.test-king.xk0-004.v2021-03-16.by.aiden.160q.ete |
Views: 701
Downloads: 911
|
Size: 1.4 MB
|
Comptia.testking.xk0-004.v2021-03-12.by.carter.147q.ete |
Views: 299
Downloads: 762
|
Size: 888.42 KB
|
Comptia.examcollection.xk0-004.v2020-12-22.by.matthew.129q.ete |
Views: 448
Downloads: 906
|
Size: 798.61 KB
|
Comptia.testking.xk0-004.v2020-05-27.by.adam.60q.ete |
Views: 488
Downloads: 1132
|
Size: 494.75 KB
|
Comptia.prep4sure.xk0-004.v2020-04-14.by.evie.77q.ete |
Views: 565
Downloads: 1196
|
Size: 619.78 KB
|
Comptia.realtests.xk0-004.v2019-10-12.by.jack.37q.ete |
Views: 853
Downloads: 1506
|
Size: 269.49 KB
|
Comptia.pass4sure.xk0-004.v2019-07-24.by.theo.27q.ete |
Views: 1204
Downloads: 1622
|
Size: 194.32 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register
IT Certification Tutorials
- Top-Level Project Management Certifications that Increase Your Career Value
- Will Python Be the Leading Language in 2019?
- List of the Most Important AWS Security Tools for Your Success
- What Opportunities Offered to The IT World by IBM Could Be Taken Advantage of in 2022
- ISACA COBIT 2019 - Business Case
- AI-102 Microsoft Azure AI - Implement Natural Language Processing Solutions
- PMI PMP Project Management Professional - Introducing Project Schedule Management Part 2
- DA-100 Microsoft Power BI - Part 4 Section 6 - Create and manage workspaces
- DA-100 Microsoft Power BI - Part 1 Level 8: Other Visualization Items for the DA-100 exam Part 2
- CompTIA CASP+ CAS-004 - Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques Part 4
- IIBA ECBA - Business Analysis and Requirements Life Cycle Management Part 3
- PMI PgMP - The Program Governance Domain
- Salesforce Certified Platform App Builder - 5 - Business Logic and Process Automation Part 7
- Amazon AWS Certified Data Analytics Specialty - Domain 4: Analysis Part 5
- Salesforce Admin ADM-211 - Process Automation : Overview