Linux Commands, Directories, and Terminals

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

1 hour 37 minutes
Video Transcription
Hello. My name is Isaac. Welcome to lean out Security.
The video. We will discuss the Lenox Architecture.
Leaners is an operating system that can be installed in many platforms, ranging from traditional computers, server platforms, mobile phones and embedded IOC devices.
The origins of Lennox can be traced back to the UNIX operating system. The blow by a TNT
tills developed by the genie you general public license fostered the development of leaners,
the Gen U, which is an acronym. That means Jan use not. UNIX was created to provide freely distributed UNIX like software that users could copy, modify and redistribute
the unique philosophy developed by can't. Thompson promoted the creation of code that could easily be extended for maintenance and further development by scientists other than the original creators.
With the unique philosophy, the Jenny was able to poured out applications that led to the creation of linens.
Linen is a colonel that utilized the free tools provided by the G N U to create an operating system.
The man behind the innovation of the Linux operating system is Linus troubles
Linus Torvalds create winners as open source software,
and that meant many developers could modify its source code to create unique implementations of the software.
The LENA is operating system is really distributed software
and many applications that Ronald Lennox are also freely distributed.
The community of contributors to DELINE, its operating system, has created many distributions of lee nuts that perform functions tailored for specific hardware platforms and application types.
These three notes distributions include Callie Knox,
You Boon to Debbie in Center, West Man Driver and Lena's Red Hat.
The Cali Knox distribution comes packaged with many free and several license security tools that can be used for penetration, testing, vulnerability assessment, information gathering, privilege, escalation and exploitation
with a letter of Linux operating system distributions created by many developers around the world.
The way to install applications and Linux operating systems for individual systems is to compile the source code off the application directly on the machine that will be using the application.
This method ensures that the application installs features that are specific to the operating system, distribution and hardware platform.
You know what it's avoid issues with compatibility that may arise due to application and platform dependencies for the various Linux operating system distributions.
During the compilation, the source Code of the application is converted into digital boundaries or executable files and with automated tools that run in the background off the operating system.
The compiled batteries of the application are automatically stored in the Bean folder off the linens directory.
So I compiled file can run all by myself.
In contrast with a compile program and interpreted application does not need to be compelled, but the source code is interpreted and executed at the end of each line until the entire code is executed.
A compound file in the Linux operating system, however, will be able to run all by itself once a permission to execute a file he's allowed for the user.
So one thing we will look at in more detail later in this chapter of the course is how to set permissions for read, write and execute functions. Profiles in the Linux operating system
for program source codes that are written in the sea language. The G M. You compile a collection GCC is used to compile the code,
so the script that is automatically used to check the systems for parameters required to compile code is a computer script.
After the computer script has checked, the system for all necessary requirements. The next crypt is the Make script, which pulls the Janu Si comme pallor to compile the batteries for the application.
Finally, the Make Install script ensures that the executable files are placed in the bean folder and the library files needed for the executable files are placed in the league folder.
The compile installations work well for individual systems, however, for enterprise kill applications, Lennox operating systems utilize application package managers that automatically manage the requirements that must be met for systems to be able to install the applications.
So these requirements are code dependencies that are unique for the different operating system platforms.
The Red Hat Package Manager manages application dependencies for distribution such as Red Hat sent US and Fedora,
while the Debian package manager is used to manage the code or application dependencies for Debbie in Lenox Mint and you boon to distributions.
So the package management formats are automated installation procedures that make it faster to install packages at a large scale than the procedure of manually compiling the batteries with a configure, make and make install scripts.
Using the installation package managers, however, means that one will have to select beforehand the package format based on the linens distribution.
So generally there are distributions that use the dot rpm format from Red Hat Package manager, And there are those distributions that use the dot D V format for Debbie and package management.
The limit structure consists of three primary integrative functions.
These three architectural structures of the Linux operating system, or the hardware, the colonel and the use of space.
The hardware consists of the physical units of the computing system upon which an operating system runs.
These are the central processing unit, hard disk drives, system board, ship sets and networking competence.
The linens colonel is a software component of the system that manages system resource allocations.
So we have system calls, memory management process control and system drivers being run by the Colonel.
The Linux operating system, a science dedicated memory space on the system. Hardware for running the Colonel.
The colonel is a heart of the operating system and runs on dedicated memory slots that are separated from other user process memory allocations.
The colonel is the interface between the user interaction space and the hardware.
So we have the colonel managing multitasking functions off the computer by should dealing CPU cycles for each process running on the system.
They're not. Distributions can be group based on the colonel they were built on.
There are different commands that can be used at a command prompt To view the various colonel types
for the Debian Package group, the command is D p K G list. Grab Lenox image for the red hat package. Manager used the R P M Q. A Grab I, Colonel, to view the Colonel,
the you name M R s command displays information for the current running colonel or image.
The LENA is Colonel has the following components
System Call interface process Management, Virtual Foul System, Memory Management Network Stack, Platform Dependent Colonel and Divide Drivers.
The Colonel based Virtual Machine is a contemporary linens colonel modification that allows the Linux operating system
to host multiple operating systems.
So with virtualization, many instances of operating systems can be operated on the same hardware platform.
The use of space is an environment where the user can gain access to interact with the computer.
In this case, we're talking about aspects such as graphical user interface, command line applications and service is
the user space initiates activities for applications and user processes.
The linens operating system can be accessed in one of two ways. The graphical user interface allows the user to gain access through a user friendly interface that can be controlled using a computer mouse for activating commands for computer operations with a click on a button that hovers on a graphical item
with a graphical user interface, basic operations for the computer can be accessed.
So the graphical user interface is viewed on the computer monitor with a deck stop environment that has Aikens for applications and a task bar for displaying running applications.
The other way to gain access to the LENA it's operating system is with the use of a command line interface that offers the user of prompt for issuing keyboard commands for the operation of the computing system.
This command line interface is Alina Shell.
There are several types of shell used on the Lino.
The most common is the bash, which is a replacement or rebirth of the born shell.
Blast stands for Born Again Shell
bash has been around for a long time now, and it is a shell that offers a broad compatibility between older UNIX platforms and UNIX.
Other shell types are the corn shell on UNIX platforms and a seashell.
The primary differences in the shells are the command syntax differences. However, most of the commands within this different shell types are similar.
The little shell is used to interact with the operating system and can be used for providing basic competing options. However, the different shell types come with bearing levels of augmentation for improved performance.
In contrast with the graphical user interface, the command shell provides a more powerful interface for interacting with a Linux operating system.
So we see here security professionals gaining skills and mastering the art of using the shell to develop and Ron scripts.
Here's a quick learning check who created the unique philosophy that allowed UNIX software to the modified and developed by scientists Other than the original creators,
a can on the hill be can comes in, See Linus travels.
The correct answer is B can't Thompson.
Linus doubles is the creator of the Lenox Colonel and can on a hill is technically my boss and master instructor here at Savary.
Okay, so in this video, we discussed Lennox operating system distributions architecture er and the born again shell
Up Next
Linux Fundamentals for Security Practitioners

Linux Fundamentals for Security Practitioners provides an overview on how to properly configure a Linux OS to provide a secure computing environment for end users. We'll cover a combination of materials, focusing on Linux architecture, permissions, commands, directories, and shells to achieve a hardened Linux operating system configuration.

Instructed By