Winter 2018 - January to April 2018 - Updated 2018-02-28 18:56 EST
See your CST8207 Blackboard announcements for an important message regarding the power shutdown at 9pm on Saturday, January 27.
_ _ _____ ____ _ _ _ _
| | | | _____ __ |_ _|__ / ___| _ _ ___ ___ ___ ___ __| | (_)_ __ | | (_)_ __ _ ___ __
| |_| |/ _ \ \ /\ / / | |/ _ \ \___ \| | | |/ __/ __/ _ \/ _ \/ _` | | | '_ \ | | | | '_ \| | | \ \/ /
| _ | (_) \ V V / | | (_) | ___) | |_| | (_| (_| __/ __/ (_| | | | | | | | |___| | | | | |_| |> <
|_| |_|\___/ \_/\_/ |_|\___/ |____/ \__,_|\___\___\___|\___|\__,_| |_|_| |_| |_____|_|_| |_|\__,_/_/\_\
Some advice from CST student Joshua McNeely
“learn how to use the website early, because it is an incredibly useful resource (it’s the only resource needed).”
I encourage you to read the course notes. Don’t take my word for it:
Note from a student in 17W:
From: Damien Houle - CST8207-17W
Subject: Wonderful Website
I wanted to make sure you're aware of how much the students and myself
from last semester appreciate your awesome website. Many of us have
used it on multiple occasions throughout our level 2 course for
our current assignments because it has everything we need, as long
as we READ ALL THE WORDS! I really miss your labs and lectures and
realize now how spoiled I was to have you as my teacher and Linux
mentor. Hope the semester offers you as much fun as our class was
although i doubt it.
Best regards
Damien Houle (aka Linux people)
Note from a student in 17W:
Dear Professor Allen,
I was working with the mid-term practice last weekend, and it doesn't goes
very well. And then I go back to watch the class notes(I know! I should do
that in the first place) because I realize that I missed lots of the
information. Then I found that the pages of course notes are super helpful.
It helps me a lot!
I thought the pages are too much links and too complex when I just taking a
quick look in the first time, but I was wrong. It's so impressive that the
contents are strong logical, everything is explained in detail but not
complicated, easy to understand. Most of the things does not take me a long
time to understand.
I really should read the pages earlier!!!
It does takes me many time to adapt the new learning style as a foreign
student, but I am feeling better right now. Hopefully, it is not too
late for the test.
Anyway, just want to tell you that the course pages are very helpful. And
thank you, This is a great work for us!
Mail about the web site from the USA:
From: King, Alexander J
To: Ian Allen
Subject: Lecture cap inquiry
Date: Sat, 8 Apr 2017 05:22:52 -0400
Professor Allen,
My name is Alexander King and I'm a computer science engineering student
at The University of Toledo, Ohio. I came across a video of you rapping
the other day. I must say it was entertaining. After that I went on to
find your website <http://www.idallen.com/>. I'm writing to inquire if
any of your lectures have been recorded and if you're able and willing to
share them with me? Your <http://teaching.idallen.com> is amazing as it
is but I figured I would ask if actual lectures were out there somewhere.
All the best,
Alexander J King
man
pwd
pwd
, ls
, hidden filescd
, TAB filename completion, absolute/relative pathstouch
vi/vim, nano
head, tail
cat, more, less
head, tail
mkdir
mv
(including using ..
)cp
rm, rmdir
find
using “wildcard” (GLOB) patterns - same as shell GLOB.bash_history
fileCheck the due date for each assignment and put a reminder in your agenda, calendar, and digital assistant. Just like in the Real World, not all due dates are on the same days or at the same times.
Last week, your instructor showed you how to log in to the Course Linux Server and use some simple commands. This week, you will create a file and then transfer the file to your laptop and upload it to Blackboard.
Assignment #02 HTML will have you log in to the CLS, do some simple commands with output redirection, and change your CLS password.
After you finish the above assignments, read File System and Pathnames.
Worksheets are preparation for your assignments. You can’t do the assignments without having done the worksheets first, and you can’t do the worksheets without having first read the Course Notes: 1. Read. 2. Worksheets. 3. Assignment.
Make notes from the worksheets on how each command works. What do the options used in the worksheets mean, for each command? (See the weekly List of Commands.)
Form a small study group to do the worksheets. Each person tries the example given, and you make sure you all get the same answers. Worksheets are not for hand-in; they are not worth marks; the assignments test your knowledge of the lectures and worksheets.
The worksheets are available in four formats: Open Office (ODT), PDF, HTML, and Text. Only the Open Office format allows you “fill in the blanks” in the worksheet. The PDF format looks good but doesn’t allow you to type into the blanks in the worksheet. The HTML format is crude but useful for quick for viewing online.
Do NOT open the Worksheet ODT files using any Microsoft products; they will mangle the format and mis-number the questions. Use the free Libre Office or Open Office programs to open these ODT documents. On campus, you can get a copy here: Course Introduction: Install Libre Office.
These first two worksheets require you to have read File System and Pathnames:
PS1, cd, find, less, ls, man, mkdir, passwd, pwd, rmdir
PS1
prompt every time you log in to the CLScat, clear, cp, find, fgrep, history, less, man, mv, rm, sleep, touch
Worksheets prepare you for the upcoming assignments.
For full marks, read the Test Instructions (all the words) before your midterm tests.
Put these dates into your phone! Use the Algonquin Registered Name Game link to test your name before the test. I don’t answer questions about the instructions during the test.
Tests take place in your one-hour lecture class, not in your lab period. You must write the test in the lecture class in which you are registered.
Each midterm test is 45 minutes long and contains approximately 45 multiple-choice questions similar to those found in Practice Tests and Answers.
Take notes in class! Keep a pad open on your desk.
This week in lecture we learn about the terminal, the shell, simple output redirection, and using pathnames, especially relative pathnames in the current directory.
Keep a notebook with a List of Commands in it.
On Blackboard, click on the hidden gear icon in the top-right corner of the “My Announcements” box and set “Show Announcements for” to “Last 30 days”.
Navigating Blackboard and the Course Notes:
Turn on “show file extensions” in your Windows machines, or else you may upload files with incorrect names such as assginment01.txt.txt
!
Never use the sample userid abcd0001
to log in. These are example userids used in the notes that are meant to be replaced with your own login userid. If you try repeatedly to log in to the Course Linux Server from home using a non-existent userid or password, your home IP address will be locked out; see the Course Linux Server notes for help on how to fix this.
Make sure you read Course Introduction: Basic EMail Etiquette before you send email to your professor.
Used in class and lab this week via Remote Login to the Course Linux Server – all the commands from Assignment #02:
exit
, date
, users
, who
, cal
, fortune
, sl
, cmatrix -s
, echo hello
, figlet hello
, toilet hello
, history
foo.txt
, use the command: rm foo.txt
^U ^L ^W ^C UpArrow DownArrow
As I said last week, if you typed your CLS userid or password incorrectly more than about three times, you got your IP address locked out. When you are locked out, follow the directions in Course Linux Server: Geting Locked Out for finding out your real IP address and getting it unblocked.
sudo
and su
on the CLSIndexNo, you are not allowed to use privileged commands such as sudo
or su
on my Course Linux Server. Use your own Linux virtual machine if you want to play with those commands.
abcd0001
Indexabcd0001
to log in. These are example userids used in the notes that are meant to be replaced with your own login userid. If you try repeatedly to log in to the Course Linux Server from home using a non-existent userid or password, your home IP address will be locked out; see the Course Linux Server notes for help on how to fix this.Note from another former student:
I just wanted to thank you again for the reference that you me when
applying for a government position last year.
I ended up getting the job and I am part of a great team.
Thanks again,
If you want a good reference from me, get great marks and keep your lab class attendance up-to-date.
Here is a note from a Student who was charged with plagiarism (academic fraud) in a previous year:
Professor,
After everything, I would just like to thank you for not giving us
any harsher consequences. I really appreciate it, it's probably the
best Christmas gift after this stressful weekend I could get. And
what might be weird for you, I'd like to thank you for that you
found this plagiarism out because I have a lesson in my mind I will
never forget. I'm still very embarrassed [...] but these are the
consequences I have to face right now. Thank you once again and I
wish you Merry Christmas and Happy New Year.
One other student involved in the above case failed the course. Review the class notes on Plagiarism if you copy the work of other students or if you let your work be copied by other students. I know who you are and we’re going to have a chat about your behaviour soon.
Commands to show the number of locked out IP addresses and attempts to use locked-out IP addresses in /etc/hosts.evil
:
$ wc /etc/hosts.evil
$ fgrep -c 'refused connect' /var/log/auth.log
$ fgrep 'refused connect' /var/log/auth.log | less
Count the unique locked-out addresses, and then show the top twenty:
$ fgrep 'refused connect' /var/log/auth.log | awk '{print $NF}' | sort -u | wc
$ fgrep 'refused connect' /var/log/auth.log | awk '{print $NF}' | sort | uniq -c | sort -nr | head -n 20
https://www.schneier.com/crypto-gram/archives/2017/0115.html
“For decades, hackers have used techniques such as jump hosts, VPNs, Tor and open relays to obscure their origin, and in many cases they work. I’m sure that many national intelligence agencies route their attacks through China, simply because everyone knows lots of attacks come from China.”