Before the days of corporate social media and Web-based services, socializing online meant connecting to a single computer that your friends were also connecting to. In fact, "connecting" typically meant "dialing," because these shared computers were usually only reachable via phone lines. To make a connection from your computer to the shared computer, you would literally place a physical telephone receiver on a special piece of hardware, nowadays called a modem, and then dial the number of the shared computer on the phone.
As computers started connecting to the Internet, fewer and fewer computers remained addressable by dedicated phone numbers. Instead, they were typically addressable by their Internet Protocol (IP) addresses. "Calling" remote computers was replaced by simply "connecting" to them over the Internet. This necessitated purchasing Internet connectivity from an Internet Service Provider (ISP) and begot the Internet we all know and, well, have mixed feelings about today.
No matter how you connect to a shared computer, though, once you're connected, less than you might think has changed since the 1970's and 80's. You can still talk with fellow users who are logged on at the same time as you, send one another electronic mail ("e-mail"), play games together, post to and read forums, and more. In fact, we used to be able to do a whole lot more, but much of what used to be possible has been forgotten in favor of the strip mall style interactions engineered by the Facebooks and Twitters of today.
Of course, the increased potential (and power) of shared servers came with increased risks. If you weren't careful, or didn't really know how to be, you might leave files intended to be private within reach of other users, accidentally (or intentionally!) deplete system resources, and generally make trouble for other users or the system operators (or "sysop") administering the machine. After all, the shared computer, often called a mainframe, was a shared space, not unlike living with roomies.
While some of this is still true today—many people still don't understand how or what it even means to tweak the privacy settings on their Facebook posts—all of the contemporary concepts of Internet use we're familiar with, like social networking and file sharing, originated in this much older context. In this workshop, we'll explore what it meant and still means to have a user account on a shared computer. We'll also look at what it takes to protect yourself from other users (whether malicious or not) who are using the same system as you are.
When you complete this lab, you will have acquired the following capabilities:
- The ability to set up user accounts and personalize a profile on a UNIX-style shared server.
- The ability to properly set and audit permissions for files and folders, both your own and your fellow users's.
- The ability to look around digital environments, such as examine running processes or finding and connecting to network services.
- The ability to socialize with other users through age-old utilities that predated the Web by decades.
This folder contains the following files and folders:
README.md
- This file.Vagrantfile
- Configuration file describing the shared server environment used in the lab.provision/
- Folder containing files that are used when automatically setting up the lab environment.
To perform this lab, you must have:
- A computer running any modern version of:
- Windows,
- macOS,
- FreeBSD,
- Solaris, or
- any flavor of the GNU/Linux operating system.
- An active Internet connection.
🔰 💻 This exercise requires the use of a command line, or "terminal." If you don't know what that means, or if you do but you feel intimidated by that, consider going through Tech Learning Collective’s free, online and self-paced Foundations: Command Line Basics course, spending an hour at Apple's Terminal User Guide (for macOS users), Ubuntu's Command Line for Beginners tutorial (for GNU/Linux users) or reviewing Computer Hope's article, "How to use the Windows command line (DOS)" (for Windows users) if you want to get started quickly. You don't need to complete the whole tutorial or article to understand this exercise, but it will dramatically improve your comprehension of this exercise's mechanics. If you want a more thorough but equally gentle introduction to the same material, consider reading (and listening to) Taming the Terminal.
In addition, you will need a user account on a remote system. This practice lab includes a virtual machine that you can use to simulate a remote system. (Creating the virtual machine is explained in the Virtual server startup section, below.) Alternatively, you can sign up for an account from a service provider, which can often be obtained free of charge.
🔰
⚠️ Depending on certain aspects of the provider's service, most of the practice lab's sections can be accomplished on an account obtained from such a service provider. However, some exercises in this lab are deliberately designed to showcase creating problems for the server or other users and should only be attempted in the lab environment provided with this guide. If this is either your first time interacting with a command line or the first time you are sharing a server with other users, we strongly recommend sticking to the lab's own virtualized server to avoid the possibility of causing trouble for real people really trying to get real work done. You can think of it a bit like learning to drive; the chances of causing a crash and potentially hurting someone are much higher if you choose to get on the highway the very first time you get behind the wheel of a car. Maybe don't?
With that understood, if you choose to proceed with the practice lab's own virtualized server, you will also need:
- VirtualBox, for running the virtualized server.
- 🔰 See § "VirtualBox installation" for detailed instructions on installing VirtualBox.
- Vagrant, for automatically configuring the lab environment on the virtualized server.
- 🔰 See § "Vagrant installation" for detailed instructions on installing Vagrant.
Alternatively, if you choose to use an account on a publicly accessible shared server and do not already have one, you will need to acquire such an account yourself. The procedure for registering such accounts varies from one provider to another. Generally, however, you fill out a Web form or send an email to an administrator who reviews your application and processes (or denies) your request. See our list of free shell account providers for links to a variety of options.
🔰 💻 Different computers are, well, different. They have different programs installed on them, their underlying Operating Systems behave differently, and they are attached to different networks. Even computers that are more-or-less the same in most respects may be configured in different ways. This means that interacting with one computer does not guarantee that you can do exactly the same things or do them in the same way when interacting with another computer. This holds true for the public, free shell accounts you can get on different providers. Those accounts may not provide the same sort of resources as the ones configured in this practice lab, so you may need translate this lab's exercises a fair bit to get them working on those systems.
This variation in computer systems is another reason why we suggest sticking to the virtualized server this lab set up for you, especially if you're new to all this. The virtual server we provide is guaranteed to work the way we expect. That said, once you do run through this lab on the virtual server, and start to feel more comfortable sharing digital space with others, getting a free account on a different system can be a great learning opportunity and, not for nothing, quite a bit of fun.
It seems obvious but is perhaps worth noting anyway that before you can explore a shell account on a shared server, you must have access to (or create) a server and a user account. This section walks you through the process of starting up the virtual server that comes with this guide, as well as the process of how user accounts on shared servers are created from the perspectives of both the server administrator and a regular user. Finally, this section also provides instructions on how to access the virtual server using the newly created user account, as well as a number of accounts that have already been created for the purpose of simulating the experience of a multi-user system in the safe and isolated environment of the practice lab.
In this practice lab's folder, find a file whose name is Vagrantfile
. This file describes the exact configuration of the hardware and software needed by the virtual server that we'll be pretending is a publicly accessible shared server. (If you're actually using a publicly accessible shared server, you can skip to the Practice section.) You will be able to log in to this shared server as both an administrator and as numerous regular users.
First, though, you must create the server itself. In keeping with the objectives of this lab, the server's creation has been automated ("scripted") using a tool called vagrant
.
🔰 We are about to create the virtual server, which requires that you have the software listed in the Prerequisites section correctly installed. If you didn't install the VirtualBox and Vagrant software packages on your computer yet go back to the Prerequisites section and follow the instructions behind the installation links to do that now.
Do this:
- Open a terminal on your computer, such as
cmd.exe
(if you're using a Windows computer) orTerminal.app
(if you're using a macOS computer). - Navigate to this lab's folder with the
cd
command. For example:cd Documents/shell-account-practice-lab
- Create and turn on the shared server in one fell swoop by invoking the
vagrant up
command:vagrant up
🔰 You will see a lot of output from the above command. If this is your first time spinning up a virtual machine with Vagrant and want to know more about what just happened (because, yeah, it was a lot), consider reading Introduction to Virtual Machine Management with Vagrant § Set up. That other practice lab includes a huge amount of detail about both virtual machines and their automation using the Vagrant utility. A lot of detail about virtual machines and Vagrant has been here omitted in the interests of brevity and to focus on the objectives of this lab: using a regular ("unprivileged") user account on a shared server. That being said, do read the other practice lab eventually, as the detail omitted here was included there.
Depending on the speed of your computer and your Internet connection, the above command could take a while to complete. Once your command prompt returns, make sure the server is online by invoking vagrant status
. Vagrant's output is often very helpful. For example, the vagrant status
command provides a natural-language description of its output, along with descriptions of how to stop the virtual machine when you're done with it, and how to bring it back up:
Current machine states:
default running (virtualbox)
The VM is running. To stop this VM, you can run `vagrant halt` to
shut it down forcefully, or you can run `vagrant suspend` to simply
suspend the virtual machine. In either case, to restart it again,
simply run `vagrant up`.
With the virtualized server successfully started, let's create your practice account.
🔰 This section is optional. If you do not create your own unique user account, then you can use the demo account (named
janedoe
) that the previousvagrant up
command already created for you. You can safely skip to the Practice section, or you can return here later to learn more about how administrators create new shell accounts.
Having a server is only part of the equation. To use the server for our purposes, you must also have a user account, sometimes referred to as a shell account. A user account is needed so that you can login to the system, which means identifying yourself as a user who has permission to use the computer's resources.
🔰 A shell is simply another term for a user interface. The term is a metaphor that refers to the outer-most layer of an Operating System, the software that makes a computer interactive, that brings it to life. If the operating system is the guts of the computer, the shell is its skin or, well, its shell. That is, it's the part you actually touch when interacting with it. Shells are usually either textual, in which case they are often called command-line interfaces or CLIs, or graphical, which are the windows, menus, and icons you may be most familiar with. Graphical shells are also called graphical user interfaces, or GUIs (pronounced "goo-ees").
Only people who have administrative access to the computer system may create new accounts. Regular users cannot do this. For the moment, let's pretend that you are not a regular user, but rather the administrator of the shared server.
As the administrator, you would be responsible for maintaining the operation of the system. This is why administrators are also sometimes called system operators or sysops for short. This responsibility encompasses monitoring the system to ensure it is functioning within accepted parameters, reviewing and processing requests that require human interaction from the system's users, and performing any maintenance that requires special privileges, such as updating software or installing security fixes (called patches).
Creating new user accounts is often, but not always, something that most systems require a human to approve. This is because user accounts are rather powerful things. An active account grants its user the ability to, well, use the computer system's resources, and a computer can be made to do some serious damage on other computers (and the world!) if used improperly or maliciously.
🔰 This practice lab isn't really intended to introduce you to system administration, so this section is intentionally terse. 🚧 TK-TODO: Do we have good resources for intros to sysadmin stuff?
You might receive a request for a new user account via email, or in a meeting where your boss says "We just hired so-and-so and they need accounts on such-and-such machine," or by way of some Web-based tool like a project management or help desk or ticketing system. Regardless, you will have collected some basic information about the new user account. At a minimum, such requests include a username, which is the name of the account the person requesting the user account would like to use when logging in. Typically, they will also include some additional details, such as the full legal name of the person to whom the account will belong, or maybe a pseudonym, a phone number or two, and maybe some free-form text. All of this except the need for a username varies from one system to another.
For our virtual server, there is also one other piece of information that we'll need from the person requesting a new account: an SSH public key. In our case, since you're going to play the role of both the administrator and the regular user, we'll just generate the information we need. If this were an actual publicly accessible shared server, you might be expected to provide the SSH public key along with your requested username as part of whatever application process you need to go through to acquire the shell account.
🔰 SSH is an abbreviation for Secure Shell. It's complex enough that we could write a whole lab about it. In fact, we did: Introduction to Securing (Virtualized) Secure Shell Servers. While we'll offer a terse explanation of setting up a new user account with an SSH public key here, we omit a lot of detail in the interests of brevity. See the SSH practice lab for more information about administering and using SSH.
Let's quickly run through an example procedure that is similar to one an administrator might use to create your shell account on a shared server:
Do this:
-
Open a new command prompt (terminal) window.
-
Navigate to the folder containing the virtual server.
-
Log in to the shared server under an account with adminsitrative access. In our case, since the virtualized server was configured by the Vagrant automation utility touched on earlier, we can simply invoke the
vagrant ssh
command to do this:vagrant ssh
This command uses the
vagrant
utility to automatically configure the various login parameters used to access the server, and perform the login. After a login greeting, you will be presented with a command prompt on the virtual machine. The command prompt will look like this:vagrant@secacct-practice-lab:~$
-
Choose a new user account name. This can be a pseudonym, or it can be a lowercased version of your first and last name. For example, if your name is Jane Doe, you might choose
janedoe
as your username. The username you pick must not contain spaces. -
Create a new user account with your chosen username. In the commands below, substitute your chosen user name anywhere the string
$user
appears:sudo adduser --disabled-password --add_extra_groups --gecos '' $user
If you chose to use
janedoe
as your user account name, you should see output that looks like the following:Adding user `janedoe' ... Adding new group `janedoe' (1007) ... Adding new user `janedoe' (1007) with group `janedoe' ... Creating home directory `/home/janedoe' ... Copying files from `/etc/skel' ... Adding new user `janedoe' to extra groups ... Adding user `janedoe' to group `dialout' ... Adding user `janedoe' to group `cdrom' ... Adding user `janedoe' to group `floppy' ... Adding user `janedoe' to group `audio' ... Adding user `janedoe' to group `video' ... Adding user `janedoe' to group `plugdev' ... Adding user `janedoe' to group `users' ...
-
Create the new user's
.ssh
directory, which will store the user's SSH login credentials:sudo mkdir ~janedoe/.ssh
-
Move to the special
/vagrant
directory, which is shared between your physical ("host") machine and the virtualized server running inside the ("guest") virtual machine:cd /vagrant
🔰 💡 Virtual machines configured with Vagrant often come equipped with a synced folder, which is accessible as
/vagrant
inside the guest (virtual machine). The contents of this folder are the same as the contents of the folder containing theVagrantfile
on the host (your physical machine), known as your Vagrant project directory. This makes use of a VirtualBox featured called Shared folders. Whatever you put into this special/vagrant
folder on the virtualized server will appear as a file on your physical laptop, and vice versa. -
Generate an SSH keypair, which is a private key and its public key counterpart, for use with the new account:
ssh-keygen -t rsa -b 2048 -N '' -C "Securing a Shell Account Practice Lab" -f shell-account_rsa
🔰
⚠️ Among other security issues, this command creates an unprotected private key. An unprotected private key file is an identity file that is not secured with a password. As long as you only ever use this identity file for this practice lab, this isn't a problem. In a real-world situation, however, this is considered extremely dangerous. For more information about the security of SSH keypairs, please consult the Introduction to Securing (Virtualized) Secure Shell Servers practice lab.This command created two files:
shell-account_rsa
andshell-account_rsa.pub
. The first (shell-account_rsa
) is your account's SSH private key file (also called your identity file). The second, (shell-account_rsa.pub
) is your account's SSH public key file. Again, refer to the Introduction to Securing (Virtualized) Secure Shell Servers for more information about these files. Soon, we'll use the identity file to log in as the user you just created. -
Inform the newly created user account that SSH login attempts using the private key we just generated should be allowed to log in to the user account we just created by copying the newly generated public key file to the new user's
~janedoe/.ssh/authorized_keys
file:sudo cp shell-account_rsa.pub ~janedoe/.ssh/authorized_keys
-
Secure the user's
.ssh
directory by making sure the directory is only readable by that user:sudo chown -R janedoe:janedoe ~janedoe/.ssh sudo chmod 700 ~janedoe/.ssh
-
Log out of the virtualized server by invoking the
exit
command:exit
You have just created a new user account and gave the user access to this account by use of SSH public key authentication. As the administrator, you can now inform the user who requested the new user account that their account is ready for their use. Meanwhile, as the regular user, you now have access to your shell account on the shared server.
We'll begin by ensuring you have successfully completed the set up steps. This process will also introduce the fundamentals that you need to understand to complete the rest of the exercise.
Computers used to be extremely expensive. Back in the 1970's and 80's, computers were housed on entire floors of huge institutions, such as the campus of the University of California at Berkeley (UC Berkeley) or the branch offices of International Business Machine, Inc. (IBM). These computers were the size of whole rooms and, often, you only had access to them while you were physically in the building they were housed. You might be on another floor of the building, but your keyboard and monitor had a very long cable that snaked through crawlspaces, making its way to the main chassis of the big computer in its own room. The main frame of those large computers could be thought of something like the body of an octopus whose tentacles reached to the cubicles in other parts of the building.
Since they were so expensive, in order to justify their cost and use in the first place, these mainframe computers needed to service the workloads of many different users at the same time. These users might be employees of the same company working in the same office, students located on the same campus, or researchers conducting their work from the same facility. To support this requirement, the mainframes ran software that managed access to the computer's equally expensive physical resources, such as hard disk space and its central processing unit (CPU), that associated each request for such a resource with a user account. The user accounts, in turn, were associated with specific humans, typically by employee or student ID number. These systems are called multi-user operating systems (or multi-user software, or even more technically accurate, multi-tasking operating systems). The Operating System software had names like AT&T UNIX®, an operating system designed and developed at Bell Labs, or the Berkeley Standard Distribution (BSD), which was based on the commercial UNIX® systems.
Imagine, for a moment, that you are an employee at a company with a mainframe system, or a student at a prestigious university that had a computer department. You come in to work or school and sit down at your desk. On your desk is a machine with a monitor and a keyboard. There is no mouse. There is no tower with a blinking light. There are no hard disk drives, no compact discs (CD's), and no thumbdrives anywhere in your office. There is only a keyboard with a long cable coming out the back, and a monitor with a similar but thicker cable.
On the monitor is a power button. When you press it, the screen flickers. Slowly, a green phosphorescent light shines from the video monitor in the shape of text. The text reads:
Login:
This moment is arguably one of the early geneses from which all modern computing was born. This simple experience of digital access is both the promise and the power that we will be exploring during this lab. If you can understand at a deep and philosophical level exactly what happened when your imaginary alter-ego from the 1970's turned on that monitor, then there is nothing that happens on a computer today that will be a mystery to you.
💻🎓 Not all such computer monitors glowed green. Notably, the technology of electrified plasma displays was popularized and commercialized by a pre-Internet network that is now largely forgotten called the [PLATO computer system]. PLATO was first available to student and faculty at the University of Illinois in 1960, and remained available until 2006, when the last PLATO system was shut down. This visionary Internet alternative was in fact the progenitor of many computing experiences we take for granted today, including forums, message boards, online learning and test taking, e-mail, chat rooms, instant messaging, remote screen sharing, and multiplayer video games. The early video monitors attached to the PLATO system glowed orange. Read The Friendly Orange Glow: The Untold Story of the PLATO System and the Dawn of Cyberculture by Brian Dear for more information and history about PLATO. Visit a running PLATO system that has been connected to the Internet for posterity at Cyber1.org.
What you are seeing is the result of electrical charges sent from the mainframe, located somewhere else on campus, over the cabling and ultimately into a cathode ray tube that fired electrons onto the glass of the video monitor. The glass is coated with phosphorescent dust, which shines when charged. The result is your invitation into Wonderland: Login:
.
In the mid-1980's, the personal computer emerged as a much smaller version of this same technology. People with means could buy and put a fully functional computer on a table in their living room or garage. These personal computers had names like the Commodore 64, Altair 8800, Apple Lisa and, of course, the IBM PC, literally an initialism for the International Business Machine, Inc. Personal Computer. Unlike a mainframe, whose input and output peripherals (the keyboard for input, and video monitor for some of its output) extended outside of the main frame of the device, personal computers had all the mainframe's components condensed into a single chassis. They were, in essence, one tiny main frame.
Also unlike the mainframes of the previous generation, which were by design intended to be used by multiple end users at once, the personal computer was, well, designed for personal use. Put another way, personal computers didn't need Login:
prompts because they were only ever designed to be used by one person: their owner. Instead of a Login
prompt, you were immediately presented with a command line or command prompt, the digital equivalent of an assistant who asks, "What would you like to do, today?"
The famous Disk Operating System (DOS), on which the earliest versions of Windows ran, presented a command line that looked like C:\>
. You could then type commands, which are instructions for what you would like the computer to do, and view the results of the computer's work. To this day, all computing, including all graphical interaction such as browsing Web sites, sharing files on Dropbox, or interacting on social media by sending tweets on Twitter, is simply a variant on this command-and-process model.
I'm going to say that again, because it's really important: to this very day, all computing—including all graphical interaction—is just a variant on this command-and-process model. Before Web sites existed, there were bulletin board systems (BBSs). Like today's websites, BBSs were places to socialize and chat. Before there were BBSs, there were mainframes. Like yesteryear's BBSs, mainframes were places to collaborate on getting work done or just to chat with your cohort.
In this lab, we turn back the cultural clock to the 1970's and 1980's to experience what the world of computing was like before the Internet as it exists today. Our virtual server uses a modern-day operating system inspired by the prevailing UNIX-like operating systems, GNU/Linux, and it comes equipped with all the contemporary amenities and security features that operating system provides. But we will be exploring this machine, and meeting the others using it, through the tactile and sensory experience of a 1970's mainframe system.
If you're ready, let's take our first steps down the rabbit hole.
You arrive at your desk one September morning a little drowsy due to a restless evening the night before. It is your first real day at university. The mandatory orientations of the previous week were not unwelcome, but they proved less than exciting. You think paperwork has always been a chore. You plop yourself into your seat. Several manilla folders, a couple of hiliters, and several half-bent sheets of hand-written notes are strewn on your desktop, evidence of your tendency for taking copious notes. You take a sip from the mug in your hand. You taste the bitterness of office coffee.
Then your eyes settle on the video monitor and keyboard in the far corner of your desk. Just as you've done every day this week, you turn it on. It glows green and greets you with a familiar message:
Login:
You sigh, remembering yesterday. You had entered your name last morning as well, but were unceremoniously rebuffed:
No passwd entry for user 'janedoe'
As you grumble something about overworked and underpaid system operators, you resolve to try again this morning. Placing your coffee carefully to one side of your desk, you pull the keyboard towards your seat and swivel your chair towards the monitor. Let's see if the sysop has finally created your shell account.
Do this:
-
Open a new command prompt (terminal) window.
-
Navigate to the folder containing the virtual server.
-
Log in to the shared server using the account you requested. For our virtual server, the command to do this is
vagrant ssh --plain -- -l $user -i $identity_file
, where$user
is the user account name you chose earlier and$identity_file
is the name of the file containing your SSH private key. If you are using an actual publicly accessible shared server, your system administrator should have supplied you with the syntax of an example command that will log you in. For example, if the user account you created on the virtual server isjanedoe
and the SSH private keys were created as described in the Creating your shell account section, above, you should be able to log in by invoking the following command:vagrant ssh --plain -- -l janedoe -i shell-account_rsa
If successful, your command prompt will change to the following:
janedoe@secacct-practice-lab:~$
It takes you by surprise. For a moment, you're not sure what you're looking at. A bunch of text has just scrolled by your screen, way too fast for you to read it all. This is not at all like earlier attempts. At first blush, all you can recognize is your command prompt:
janedoe@secacct-practice-lab:~$
You're in! Your account has been created and you are now logged in to the system. You scroll up a bunch to read some of what you missed. Several things stand out to you. The first chunk of output is the system's log-on message. It begins with a literal "Welcome" message:
Welcome to Ubuntu 16.04.5 LTS (GNU/Linux 4.4.0-133-generic x86_64)
There is a huge amount of information packed into this one line.
🔰 The exact welcome message you are sent may be slightly different than the one printed above. In particular, version numbers may change depending on when exactly you are reading this. Don't be alarmed if there are slight differences between the example outputs in this guide and your own lab environment.
Ubuntu is the name of a free operating system distribution. This server purports to be version 16.04.5 of that operating system. "LTS" is Ubuntu's abbreviation for "long term support." An LTS release of Ubuntu is a version of the operating system that the vendor promises to maintain for a longer period of time than other versions. System administrators tend to prefer LTS releases (or whatever equivalent terminology is used by their operating system of choice) because it makes their jobs easier as fewer incompatibilities are introduced between software version releases.
Ubuntu is a derivative of Debian, another operating system in the same family. In this case, the system is using the GNU/Linux kernel, specifically version 4.4.0-133-generic
. Furthermore, the kernel is built to run on the x86_64
hardware architecture.
🔰 A kernel is the most foundational piece of an operating system. It is ultimately responsible for everything else that happens in the operating system, or the installed applications. The kernel is so named because it is conceptually at the core of the computer. It intializes hardware components such as disk drives, manages volatile random-access memory segments (RAM), and controls the central processing unit (CPU) of the computer.
If the shell is the outermost layer in a computer system (the part you interact with as an end user), the kernel is the innermost layer.
🔰 💡 An operating system and a kernel are often discussed as though they are one and the same, but this is not technically accurate. Different operating systems, such as Ubuntu or Debian, can sometimes use different kernels. For example, while the Debian operating system currently only officially supports the GNU/Linux kernel, it can be built to run on the GNU/Hurd kernel instead, and even officially supported the FreeBSD kernel in the past.
🔰 💡 Most of the time, regular users don't have to worry about GNU/Linux kernels, or their versions. That task is delegated to the system administrator. However, in the age of personal computers, owning a computer system at all means you are both a regular user and that computer's system administrator. If you're also running a GNU/Linux-based operating system, such as Ubuntu, it certainly helps to know a little bit about kernels!
In the example output above, the Ubuntu kernel version string
4.4.0-133-generic
has a specific meaning, described by the Ubuntu Kernel Team in their documentation. For the curious, this version is specifically GNU/Linux kernel version 4, major revision 4, minor revision 0, application binary interface (ABI) version 133, of thegeneric
flavor. This doesn't typically mean very much to an ordinary user, except for the fact that it's a number you'll want to include when reporting issues, should issues arise, or when asked to collect more information to help a developer debug any issues you might encounter.🔰 💡 Just as there are different operating systems, there are different hardware architectures, too. The most ubiquitous hardware for servers and most of the personal computer industry is Intel's x86 microprocessor. Contemporary Apple macOS devices (not the iPhone, but the line of desktop and laptop Macintosh computers), Windows-based computers, and a huge range of BSD and GNU/Linux operating systems are all often built to be hardware-compatible with Intel's x86 chips.
The
x86_64
variant is Intel's 64-bit computing hardware. The hardware is "64-bit" because the individual instructions sent to the CPU, called a hardware word, are at most 64 bits long (or "wide," depending on your viewpoint). You might also see the termamd64
, which is for all intents and purposes equivalent tox86_64
. Theamd
stands for Advanced Micro Devices (AMD), Inc., a competitor to Intel producing microprocessors that are compatible with Intel's x86 instruction set.As an end user, you need to know which hardware your computer (or shared server) is using so that you know which pre-compiled software packages will run on your system. If you try to run software compiled for, say, an Advanced RISC Machine (ARM) architecture on a machine that uses an Intel x86-based CPU, it certainly won't work.
Following the operating system's "Welcome" line are some pointers in the form of Web addresses. There are pointers to the official Ubuntu documentation, the homepage for a management service called Landscape, and links to where you can find paid support. These are here because the maker of Ubuntu, a for-profit corporation by the name of Canonical, Ltd., bases its paid offerings on their free offerings. All of these services are optional, but some organizations who use the Ubuntu operating system subscribe to these services, as well.
You have no need of any of these, so you scroll right past this block of text:
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
Next, the system shows you a brief summary of the state of the currently installed software on the shared server. The server reports that everything is up to date: no packages can be updated and, of these, none are security updates.
0 packages can be updated.
0 updates are security updates.
That sounds like good news to you. You pause for a moment to wonder if perhaps everything is up to date because the university's sysop took the opportunity to perform some basic system maintenance while they were creating your user account.
🔰 A package is exactly what it sounds like: a pre-packaged piece of software. "Pre-packaged" usually means that it has been compiled for you. Compilation is the process of turning files containing source code, which are a bit like the words of a magic spell in a spellbook, into machine code, which are the actual program instructions fed into the computer's CPU when it runs the software program.
Whether you realize it or not, you're already very familiar with software packages. For example, you use packages every time you install an app from the Google Play Store or the Apple App Store on your phone. Android apps that you install from the Google Play Store are simply "Android package files," literally a file that ends in
.apk
, which stands for "Android package." The Google Play Store, and all app stores, are simply graphical package managers, programs that manage the installation, removal, updating, and reporting on packages.
Immediately following the package summary is an update announcement:
New release '18.04.1 LTS' available.
Run 'do-release-upgrade' to upgrade to it.
*** System restart required ***
This is a message from the Ubuntu operating system informing you that a newer LTS release of Ubuntu is available, along with a notification that the system needs a reboot, and is nudging the administrator to turn it off and then back on again (System restart required
). You smile inwardly as you realize these messages are certainly not intended for you. They're intended for the system administrator. Only an administrator has the privileges required to restart (or "reboot") the computer system, because doing so would interrupt all the other users connected to it. Moreover, only an administrator can make changes to the operating system, which a major upgrade would certainly be.
Your eyes linger on this message for longer than they need to. If this message was not intended for you, how is it that you're seeing it? What else can you find here that may not be intended for you? How much more is already in here, anyway? You push your mug of coffee further across your desk, realizing that you are now energized despite your relatively decaffeinated state. You read on, eyes widened in anticipation of what you might encounter next.
The system's welcome message ends rather abruptly with a bit of legalese:
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.
After that, the sysop's own welcome message is printed. You can tell it's the sysop's message and not the Operating System vendor because the tone and the subject suddenly shifts to the specifics of the system you've just logged in to. And then, once again, the expectant prompt:
janedoe@secacct-practice-lab:~$
The square cursor sits there, blinking at the end of the line, waiting for you. Its green light shines into your eyes, reminding you of all the turn signals toggling on and off at each leg of your commute. How many turns did you take to get here? How many choices did you make that brought you to this moment?
And where will you turn to go next?
When you first encounter it, you sense an undeniable starkness to the digital space you've just entered. You lean forward in your chair, leaning towards the screen, as if moving your eyes closer to text it displays will help you see past them, into the space beyond. The edges of each glyph of text blur slightly, producing an almost invisible halo around each printed character. A soft hum enters your peripheral awareness, with an occasional barely-audible crackle. Suddenly, you realize the sound is the electricity powering the monitor. It sounds almost as if it's preparing to leap from the monitor out onto your desk, escaping the confines of cable and metal. Or, maybe, that it's pulling you in.
Is this really happening? You think you should pinch yourself, just to make sure you're not still sleeping. Instead, you simply press the Return
or Enter
key on your keyboard. Dutifully, the mainframe processes your input and returns another prompt:
janedoe@secacct-practice-lab:~$
janedoe@secacct-practice-lab:~$
The appearance of the second prompt confirms it: you really are logged on, and you really are interacting with the mainframe. Pressing the Return
key sent a newline character to the computer. The newline character was processed, literally writing a new line onto the screen. The new line moves the terminal's output up by one line. Since the only character you entered on the command line was a newline, after the newline was written, the computer prompted you again. You imagine a voice speaking to you emerging from the glass of the video monitor, a voice that only you can hear. "I have written a new line. What would you like to do next?" it says.
🔰 💡 A newline character is just like a letter, such as the letter
A
, except that instead of representing a letter, it represents a new line. Even though you may not have thought about it before, you're already familiar with newline characters because you use them every time you write anything down, anywhere, including a pen and paper. When you end one paragraph and begin another, you start writing the second paragraph on a new line in your notebook. This act of lifting your pen and then moving it to a new line in your notebook feels implicit to you because you're so used to doing it, but it is an actual, real-world action that you must take. If you were dictating an essay to a friend (or employee) who was typing your words up for you, a typist, you would instruct the typist to do this explicitly by saying something like, "New paragraph." The typist then understands that you intend to start a new paragraph.In the 1960's, typing these sorts of correspondence and memos was the job of someone called a secretary. A businessperson's secretary didn't have access to a computer, so instead they used mechanical typewriters. These analog machines also needed to be explicitly told to start a new line of text when the typist reached the right hand edge of the page. To do this, the typist would press keys on a special row of their typewriter containing control characters. One of these control characters was called a line feed, and it instructed the machine to move the paper up by one line. Immediately following the line feed, the typist would then press the carriage return key, which returned the physical carriage holding the paper in place to the right side of the typewriter. This positioned the type hammer (literally, a metal hammer shaped like a letter) at the left-most column of text on the page. At the end of each and every line, the typist needed to perform this line feed and carriage return sequence to begin a new line at the correct place on the page.
Early digital equipment that replaced mechanical typewriters simply copied this mechanism verbatim. To move the cursor to the left of the screen, you would send the carriage return control character, sometimes written as
\r
in computer code. However, to move the cursor down one line of text, you would need to send the line feed, nowadays more simply called "new line," control character. In computer code a line feed or new line character is often written as\n
. Together, this sequence is sometimes abbreviated asCRLF
, for "carriage return line feed." TheReturn
key on keyboards today is an evolutionary artifact descended from their typewriter ancestors.These days, since there is no longer a physical carriage holding paper to return anywhere, different systems interpret carriage return control characters in different ways. On UNIX-like systems, such as our GNU/Linux virtualized server, a carriage return is often meaningless. To move the cursor down a line and move it to the left of the screen, a single new line character (
\n
) suffices, which is the input you're sending when you press theReturn
key on your keyboard at a command prompt.
You have read about people who can talk to machines. You imagined secret chambers, hidden away behind locked doors, with dark rooms basking in blue from electric fires. The books and TV shows you watched as a child showed you tantalizing visions of far-future utopias and dystopias full of wondrous and terrifying automatons. Some were friendly, some were deadly, but all of them were powerful. But not until now have you ever had the chance to talk to a machine yourself.
Now that you were finally here, you feel a small twinge of disappointment as you realize you don't actually know what to say. The computer answers so quickly, and yet here you sit, keeping it waiting…and waiting. Worse, you realize that even if you did know what you wanted to say or do here, you wouldn't really know how to say or do anything here in the first place. How is it that the people you read about, the ones who can talk to computers, actually learned to communicate with machines? They must have had help.
You look up from the video monitor at the clock above your desk. It's still early. You straighten, pulling your shoulders back. Glancing about the office, you can see that almost no one else has arrived yet. It is just you and the machine. The two of you are going to have to figure out how to communicate with one another by yourselves.
Your fingers find your keyboard once again. They float above the keys for a moment, and then find purchase on the following keys: h
, e
, l
, l
, o
, ?
. The sound of loud clacks ring your ears, as though echoing through a dark chamber like the ones you used to imagine. Each letter you type appears on your screen as you type it. Your console now looks like this:
janedoe@secacct-practice-lab:~$ hello?
The cursor at the end of the line blinks a couple more time. Then you press the Return
key, sending a newline control character to the mainframe. The computer replies in an instant:
No command 'hello?' found, did you mean:
Command 'hello' from package 'hello-traditional' (universe)
Command 'hello' from package 'hello' (main)
hello?: command not found
Your eyes scan the textual reply. This feels different than you expected. You are not really speaking, but rather issuing instructions. Whatever you say here is interepreted as a command to be performed. Apparently, the mainframe does not know what to do when you ask it hello?
. You're not entirely sure what hello-traditional (universe)
or hello (main)
mean, either, but what is very clear is that hello?
is confusing the computer. After all, it told you this twice. Reading "No command 'hello?' found
" and "hello?: command not found
" almost feels like the computer is trying to be understood as hard you as are trying to understand it.
This is all starting to remind you of something eerily familiar. The bar you drank at last night was one of your first times going out for drinks on campus. You've never been a heavy drinker and didn't know exactly what to order. Cocktails have fancy names that don't always make sense to you. Why is it even called a "martini," anyway? The name seemed to make perfect sense to everyone around you, and after you asked for help from your friend, the bartender knew exactly how to prepare what you ordered. But the name is still a mystery to you, despite being uncomfortably familiar with its physical effects. If only you could've asked the bartender for help, without feeling like a square.
Perhaps the computer isn't impatiently waiting for your input. Maybe, just maybe, it is just waiting, neither patiently nor impatiently. Perhaps it will not embarass you to ask it for help.
Do this:
- Return to a command prompt of your shell account on your shared server, if you are not already there. Remember, for the virtualized server prepared with this lab:
- Invoke the
vagrant status
command from within the Vagrant project root, which is the folder containing theVagrantfile
for this lab to check if the virtual server is running. - Invoke the
vagrant up
command to turn on the virtual server. If the server is already running, this command will do nothing, so it is safe to use regardless of whether the server is currently on or off. - Log in to your shell account with the
vagrant ssh
command, your shell account's user name, and your SSH identity file. For example:vagrant ssh --plain -- -l janedoe -i shell-account_rsa
- Invoke the
- Ask your shell for help by entering the
help
command:help
Your fingers return to the keyboard. This time, you type a little faster: h
, e
, l
, p
, followed by the newline character, using the Return
key. Suddenly, pages of text flash across your screen. Much like when you logged in, you have to scroll back to read it all. You do, so that you can begin reading the computer's reply, well, from its beginning:
GNU bash, version 4.3.48(1)-release (x86_64-pc-linux-gnu)
These shell commands are defined internally. Type `help' to see this list.
Type `help name' to find out more about the function `name'.
Use `info bash' to find out more about the shell in general.
Use `man -k' or `info' to find out more about commands not in this list.
A star (*) next to a name means that the command is disabled.
job_spec [&] history [-c] [-d offset] [n] or history -anrw [filename] or history -ps arg [arg...]
(( expression )) if COMMANDS; then COMMANDS; [ elif COMMANDS; then COMMANDS; ]... [ else COMMANDS; ] fi
. filename [arguments] jobs [-lnprs] [jobspec ...] or jobs -x command [args]
: kill [-s sigspec | -n signum | -sigspec] pid | jobspec ... or kill -l [sigspec]
[ arg... ] let arg [arg ...]
[[ expression ]] local [option] name[=value] ...
alias [-p] [name[=value] ... ] logout [n]
bg [job_spec ...] mapfile [-n count] [-O origin] [-s count] [-t] [-u fd] [-C callback] [-c quantum] [array]
bind [-lpsvPSVX] [-m keymap] [-f filename] [-q name] [-u name] [-r keyseq] [-x keyseq:shell-command] [keyseq:readline-functio> popd [-n] [+N | -N]
break [n] printf [-v var] format [arguments]
builtin [shell-builtin [arg ...]] pushd [-n] [+N | -N | dir]
caller [expr] pwd [-LP]
case WORD in [PATTERN [| PATTERN]...) COMMANDS ;;]... esac read [-ers] [-a array] [-d delim] [-i text] [-n nchars] [-N nchars] [-p prompt] [-t timeout] [-u fd] [name ...]
cd [-L|[-P [-e]] [-@]] [dir] readarray [-n count] [-O origin] [-s count] [-t] [-u fd] [-C callback] [-c quantum] [array]
command [-pVv] command [arg ...] readonly [-aAf] [name[=value] ...] or readonly -p
compgen [-abcdefgjksuv] [-o option] [-A action] [-G globpat] [-W wordlist] [-F function] [-C command] [-X filterpat] [-P pr> return [n]
complete [-abcdefgjksuv] [-pr] [-DE] [-o option] [-A action] [-G globpat] [-W wordlist] [-F function] [-C command] [-X filte> select NAME [in WORDS ... ;] do COMMANDS; done
compopt [-o|+o option] [-DE] [name ...] set [-abefhkmnptuvxBCHP] [-o option-name] [--] [arg ...]
continue [n] shift [n]
coproc [NAME] command [redirections] shopt [-pqsu] [-o] [optname ...]
declare [-aAfFgilnrtux] [-p] [name[=value] ...] source filename [arguments]
dirs [-clpv] [+N] [-N] suspend [-f]
disown [-h] [-ar] [jobspec ...] test [expr]
echo [-neE] [arg ...] time [-p] pipeline
enable [-a] [-dnps] [-f filename] [name ...] times
eval [arg ...] trap [-lp] [[arg] signal_spec ...]
exec [-cl] [-a name] [command [arguments ...]] [redirection ...] true
exit [n] type [-afptP] name [name ...]
export [-fn] [name[=value] ...] or export -p typeset [-aAfFgilrtux] [-p] name[=value] ...
false ulimit [-SHabcdefilmnpqrstuvxT] [limit]
fc [-e ename] [-lnr] [first] [last] or fc -s [pat=rep] [command] umask [-p] [-S] [mode]
fg [job_spec] unalias [-a] name [name ...]
for NAME [in WORDS ... ] ; do COMMANDS; done unset [-f] [-v] [-n] [name ...]
for (( exp1; exp2; exp3 )); do COMMANDS; done until COMMANDS; do COMMANDS; done
function name { COMMANDS ; } or name () { COMMANDS ; } variables - Names and meanings of some shell variables
getopts optstring name [arg] wait [-n] [id ...]
hash [-lr] [-p pathname] [-dt] [name ...] while COMMANDS; do COMMANDS; done
help [-dms] [pattern ...] { COMMANDS ; }
The first few lines of the computer's reply to your request for help are similar to the system's log on message. It tells you a name, something called GNU bash
, then the version of whatever GNU bash
is (version 4.3.48(1)-release
), followed by information regarding the hardware for which this GNU bash
thing was built ((x86_64-pc-linux-gnu)
). All this information was on the first line of the reply:
GNU bash, version 4.3.48(1)-release (x86_64-pc-linux-gnu)
Next came the most comprehensible part of the reply. It sounds just like someone in a chat room replying to you:
These shell commands are defined internally. Type `help' to see this list.
Type `help name' to find out more about the function `name'.
Use `info bash' to find out more about the shell in general.
Use `man -k' or `info' to find out more about commands not in this list.
It dawns on you that you are not merely connected to a computer. Indeed, you are already running a program on the mainframe. The program you are running is a shell called GNU bash
, or just bash
for short. When you typed help
, you asked the app you are currently using (bash
) to show you the help information for itself. The remainder of the help page lists the various words that the bash
program understands when you speak them to it. Curious, you try asking for more specific help. You type help name
and then press Enter
:
janedoe@secacct-practice-lab:~$ help name
-bash: help: no help topics match `name'. Try `help help' or `man -k name' or `info name'.
A smile creeps along your lips. When bash
told you to "Type 'help name' to find out more about the function 'name'.
, it did not mean you should literally type h
, e
, l
, p
, then a space, then n
, a
, m
, and e
, but rather to substitute name
for the name of one of the commands in the list of commands bash
understands. Sure enough, name
is not included. Helpfully, bash
offers further information about how to use the help
command itself. You give that a go, typing help help
and pressing the Return
key to send your words off to the computer for a reply. As before, the response is returned to you with astonishing speed:
janedoe@secacct-practice-lab:~$ help help
help: help [-dms] [pattern ...]
Display information about builtin commands.
Displays brief summaries of builtin commands. If PATTERN is
specified, gives detailed help on all commands matching PATTERN,
otherwise the list of help topics is printed.
Options:
-d output short description for each topic
-m display usage in pseudo-manpage format
-s output only a short usage synopsis for each topic matching
PATTERN
Arguments:
PATTERN Pattern specifiying a help topic
Exit Status:
Returns success unless PATTERN is not found or an invalid option is given.
Some of this is clear to you, but much of it isn't. What's an "exit status" and what is the difference between an "option" and an "argument?" You remember grade school and how frustrating your French classes were. This feels like that. It feels like learning a new language. You skim the long list of available commands from the output of the help
command again, looking for something you can say to the computer that you might already more-or-less be able to understand without too much more reading and fumbling. The commands are words like "alias
", "shift
", "break
", "declare
", "bind
", "echo
", "read
", "logout
", "set
", and "unset
". All of these and, in fact, most of the commands in the list are verbs. So this feels like learning a new language because it is a language.
You are learning to speak before you know what you might like to say. For a moment, this feels hopeless. What is the point of learning to speak if you do not know why you would bother? Then again, you have done this before. It is how you learned to speak with other humans. This is no different. It is simply a return to an earlier, younger part of your life. As with your speech, you learned to take your first step before you knew where you might want to go. The more words you learned, and the better you learned to control your limbs, the more you could do in the world. You became wise and powerful, and now, today, you will learn to speak and walk all over again. This time, you will learn to speak and walk and become powerful inside of a computer, inside Wonderland.
Over and over again for the next half hour, you type help
followed by another command in the list. Over and over again, you read pages of text that you don't fully understand. You don't even hear your name being called from the cubicle next to yours.
"Jane! JANE!"
You feel torn out of cyberspace and back into the physical world. You look up to see your coworker and friend, Alice, looking at you with a slightly worried expression on her face.
"Jane, are you all right?"
"What? Yeah, fine. I'm fine. Sorry, I was just…." You turn to the video monitor, still humming quietly.
"Oh," Alice smiles. "You got your shell account."
"Yeah. I was just…reading the help pages. I've never used a GNU/Linux system before." You try to swallow the tone of embarassment from your voice, half unsure why you even feel that way. Nevertheless, you don't want it known that this is all new to you. Maybe it was something in the way the sysops talked to each other, like they were part of some club that would never have you as a member. Maybe it was a reaction to experiences you had in school when you got more excited than was apparently permitted about the lesson plan. Whatever it was, you didn't want to start your first week here on the wrong foot. But Alice had been welcoming since the moment you met her, and this was no different.
"That's awesome!" she exclaimed. "Want to show me what you've done so far?"
"I…well, I haven't done very much, yet. I'm not exactly sure what to do."
"Anything you want!" came Alice's excited reply. "What do you want to do?"
"I don't know. Just look around, I guess."
"Well, how would you feel about looking around with me?"
"I think I'd like that very much."
Alice pulls up a chair next to yours. She falls into it with a twirl of excitement. "All right," she starts. "Let's look around!" Instinctively, you begin to roll your chair away from the keyboard. "No, no," Alice stops you. "You drive," she smiles. You pull yourself back to the keyboard.
"Okay," you say. "What do I do first?"
"Well, before we can know where to go, we have to know where we are," Alice says. "Have you learned about the filesystem?"
You shake your head.
"Let's start there, then."
"Okay."
Alice leans forward in her chair to point at the screen at the back of the desk. "See the last line there, on the bottom of your window? That's your prompt. It's not just asking you what command to run next. It's also full of information that tells you about where you are and what's currently going on."
You review the prompt on the screen:
janedoe@secacct-practice-lab:~$
Alice continues, "The symbols on the command prompt are meaningful. On the far left, of course, is your username or login name. Some of us also call this your handle. That's just slang for 'nickname.' After your username comes an at-sign (@
), which separates your name from the name of the computer to which you have just logged in. There cannot be another janedoe
on this computer, but there might be another user named janedoe
on some other computer. If you log in to another computer, even if your username is janedoe
on that other computer, your prompt will be different because the hostname portion will be different. That's how you can know which computer you're actually talking to when you see a command prompt. We call the computer's name a hostname because it 'hosts' you while you're logged in. I think that's kind of sweet."
Alice's pause causes you to look back at her and away from the screen. "I like the metaphor," you say.
"There are a lot of metaphors," Alice says. "In fact, the very next part of the command prompt is this colon (:
), which separates the hostname from the pathname. In this case, the pathname is the special symbol tilde (~
). That symbol is shorthand for 'your home folder.' It's basically like your own office inside the computer. You can put your digital files here, organized in whatever way you like. By keeping your personal stuff inside your 'home' folder, it will always be easy to find."
"Do you have a home folder?" you ask Alice.
"I sure do! I'll show it to you in a minute," Alice says. "But first, there's one last part of the command prompt that's super important."
"The dollar sign ($
) at the end?" you ask.
"Yup," Alice answers. "That dollar sign is the computer's way of telling you that you are speaking to a command shell and have regular user privileges, and not any special powers or elevated privileges like the sysops and administrators have."
"Right." You nod. Although immediately curious about these "elevated privilegs," you think it best not to ask too much about how to elevate your privileges just yet.
"So, you're speaking to a command shell, and you're in your home folder. Enter the pwd
command, then press the return
key to run that command."
"Okay," you say as you type. An instant later, your prompt looks like this:
janedoe@secacct-practice-lab:~$ pwd
/home/janedoe
janedoe@secacct-practice-lab:~$
"See that?" Alice continues. "The response from the computer to the pwd
command is to print out the pathname of where you are right now."
"My home folder," you say.
"Exactly. Your home folder is just like any other folder on your computer, but it's named the same as your user account—janedoe
, in your case—and it's inside of another folder called home
. That's why it's your home folder! It's a folder with your name on it inside of a folder called home
. Each of the slashes in the output to the pwd
command (/
) represents the fact that the folder name on the right of the slash is inside of the folder named on the left. So, in this case, your janedoe
folder is inside of a folder, which we know because there is a slash and another name to its left, and that folder is called home
. Or, put another way, from the start of the computer's digital filing system, denoted by the first slash with nothing to its left, there is a folder called home
, inside of which there is another folder called janedoe
. And that's why it's called a pathname: it's the path to a file (or folder) from the very start, or root of the filesystem."
"So," you start to form a question, pause to do so, and notice Alice smiling at you out of the corner of your eye.
"Yes?"
"Well, so, would that mean your home folder is a folder called alice
inside the home
folder?"
"Exactly!" Alice beams. "But don't take my word for it. Go look for yourself."
"Okay, how do I do that?" you ask, doing your best to suppress any embarrassment for having to ask.
"Good question!" Alice declares, obviously excited. "There's another extremely important command that you need to know to do that, the ls
command. This command lists the contents of folders. That's why it's called, 'ls
', it's just an abbreviation for 'list.' And, technically, we don't call them 'folders,' we call them directories, because the way a folder actually works is that it's just a special kind of file whose contents is a directory of addresses (called inodes, short for index nodes) for each of the files it contains. It works similarly to the placard posted at reception downstairs; the placard is a directory of the offices in this building, with a room number and the name of the person whose office that room is. If you issue the ls
command, then a space, and then the pathname to a directory (folder), the computer will show you the contents of the directory at that pathname. That is, it prints the names of the files in that folder."
You nod slightly. "And so, if I wanted to find out what's in the home
folder—I mean, the home
directory—I would tell the ls
command to list its contents?"
"Yup! It's that easy."
Encouraged, you type out your first attempt:
janedoe@secacct-practice-lab:~$ ls home
ls: cannot access 'home': No such file or directory
"Don't forget any of the slashes in the pathname," Alice reminds you even before you get a chance to read the computer's response.
Your second attemt yields far more success:
janedoe@secacct-practice-lab:~$ ls /home/
alice bob janedoe labadmin mallory rappinbill ubuntu vagrant
"Ah, okay, so /home/
is not the same as home
with no slashes?"
"Well, not exactly," Alice explains. "The difference isn't so much that they are not the same directory because, remember, these are pathnames you're typing, which simply refer to locations in the filing system. It's a bit like asking the librarian for a given book on a given shelf. If you don't specify the wing of the library and the number of the bookcase along with the shelf on that bookcase and the name of the book, then the librarian won't know exactly which shelf, and thus also which specific book, you're asking after. When you omit the slashes, you're using a relative pathname, which is a location relative to wherever in the filing system you are currently browsing. Since there isn't a directory (folder) called home
inside your 'home folder,' the ls
command told you that No such file or directory
exists in the place you asked it to look. When you include the very first slash in the pathname, though, you're using an absolute pathname, which means you're describing precisely each and every step in the path from the start of the filing system all the way to your destination."
"You're saying that the first time I used ls
, I was actually asking for slash-home-slash-janedoe-slash-home (/home/janedoe/home
), because pwd
told me I was already browsing in /home/janedoe
?"
It feels awkward to say all those slashes out like that, but Alice mimics you without missing a beat.
"Exactly. And then when you did it the second time asking for slash-home-slash (/home/
), you were asking for the specific directory located at exactly that point in the filing system, because your request began with that first slash. And actually," Alice leans over your keyboard momentarily to place her finger on your monitor, "that last slash is unecessary, so you could have just asked for slash-home (/home
) as well and that would have had the same effect."
"Okay, I think I'm starting to get this," you say.
"Of course you are," Alice says. "And look, there's my home folder."
"And a bunch of other people's!" you say.
"Have a look in mine," she says.
"Okay," you say. "That would be…ls
and then 'home alice'?"
"That's right," Alice says.
Vocalizing pathnames without all the slashes is certainly easier. Besides, Alice doesn't seem to need them to understand you anyway. When typing out the commands to the computer, however, you carefully reinsert all the required leading slashes.
janedoe@secacct-practice-lab:~$ ls /home/alice
intranet_html
"What's intranet_html
?" you ask, suddenly curious.
Alice smiles. "I'll show you that soon. But first, I want to show you another way that you can list out the contents of my home folder, which might make all this pathname stuff easier to understand, too. Type ls
, but this time, use dot-dot-slash-alice (../alice
) instead of slash-home-slash-alice (/home/alice
) for the path."
janedoe@secacct-practice-lab:~$ ls ../alice
intranet_html
"Same thing," you say.
"Yup, you're listing the same folder, but you're refering to it in a different way."
"A relative path again?" you ask.
"Yup, which you can tell because the pathname doesn't start with a leading slash. Instead, it has two dots, which is the pathname syntax for 'up,' or 'above,' or 'before', or 'parent,' or 'towards the root,' or 'the folder inside this one,' whichever 'this one' happens to be at the moment. Using dot-dot-slash (../
) is how you can ask for items ajacent to, or siblings of, your current location, because you're asking for the item in the folder (denoted by the /
) 'above' the relative location of where you are (denoted by the double-dot syntax, ..
). If you want to see this more visually, use the tree
command exactly the same way you would use the ls
command."
"So, like I could do tree
-slash-home?"
Alice gestures at your keyboard as if to tell you to have a go.
janedoe@secacct-practice-lab:~$ tree /home
/home
├── alice
│ └── intranet_html
│ ├── book
│ │ └── chapter1.html
│ └── index.html
├── bob
├── janedoe
├── labadmin
│ ├── bin
│ │ └── intranet-httpd.py
│ └── intranet_home
│ └── index.html
├── mallory
├── rappinbill
│ └── intranet_html
│ └── index.html
├── ubuntu
└── vagrant
13 directories, 5 files
"Oh, wow!" you say. "Yeah, this is way easier to visualize now."
"Unlike ls
, tree
will actually list the contents of every folder that it encounters, recursively. You can get ls
to do this too, but you need to explicitly tell it to do so by using a command line option. The point of tree
, though, is to help you see the layout of the filesystem more visually. And, as you can see, the filesystem is always laid out in this tree-like structure, with a root at the very beginning, technically called 'the root directory and then individual folders fanning out into 'branches' of this metaphorical tree."
"And the files are the leaves," you add.
"Precisely," Alice smiles. "See, you're totally getting this."
"You're right, there are a lot of metaphors."
"Just wait," Alice says, grinning, "this is just the tip of the iceberg."
"How many files are there?" you ask.
"Well, a lot. I mean, I don't know exactly. There are some files we can't see because we don't have administrative capabilities to look in the folders where they are stored," Alice says. "But we can certainly try to find out. See how the last line of tree
gives you a count of all the directories and files it saw?"
"That's kind of what I was thinking. Can I just do tree /
?" you ask.
"It's going to print a ton of output, but it's not going to do any damage. Give it a whirl, and while you're at it, practice using ls
to look around the filesystem some more."
Do this
- To figure out where in the filesystem you are currently browsing, use the
pwd
command. The response from the computer shows you where you are as an absolute pathname. The command is an abbreviation for "Print Working Directory."pwd
- Find out what's in the
/home
folder using thels
command:ls /home
- List the contents of another user's home folder by referencing their home folder as a pathname.
- Do this with an absolute path:
ls /home/alice
- Do it with a relative path as well:
ls ../alice
- Do this with an absolute path:
- Visualize the filesystem layout in Alice's home folder using the
tree
command.tree /home/alice
- Have
tree
count the total number of files and directories that you can find for the entire filesystem by referring to the root directory:tree / # THIS IS GOING TO PRINT A LOT OF OUTPUT.
After a few more quick experiments, the questions start piling up in your mind.
"So, how do I find out what's in these files? Can I make my own? And how do I move them around?"
"All good questions," Alice says. "For each of those actions, you use a different command. But first, one more super important command that'll help you look around: the cd
command."
"What does cd
do?"
"It changes where you're currently browsing. The command stands for 'change directory,' and all it does is move you to the place in the filesystem that you reference via pathname. From then on, all relative pathnames refer to your new location. For example, try first going to my home folder, and then listing the contents."
"So that's just cd
and then slash-home-slash-alice, just like with ls
?"
"Yup."
"Okay," you say as you begin to type.
janedoe@secacct-practice-lab:~$ cd /home/alice
janedoe@secacct-practice-lab:/home/alice$
"Ohhhhhhhhh," you say. "The prompt changed."
"Exactly," Alice says. "The tilde (~
) was replaced by your new location, which is where you cd
'ed into. Think of cd
like moving yourself to another place in the library. Now you can just list the contents of 'here,' because you're already in the place where you want to look."
"How do I say 'here' in command-line-speak, though?" you ask.
"Well, in a pathname, 'above here' is written as two dots (..
), so just 'here' is written as a single dot (.
) on its own."
janedoe@secacct-practice-lab:/home/alice$ ls .
intranet_html
"That makes sense," you say.
"Yup. But also, for some commands, ls
included, if you don't specify a path, they will make an assumption for you. So in this case, you can also just type ls
without the space and the dot, and you'll get the same effect."
"Got it."
"Finally, now that you've left your home folder, you should know that there's a super easy way to get back there just in case you ever find yourself metaphorically lost."
"What's that?"
"Just type cd
without any path at all. By default, this will return you to your home folder no matter where you are."
janedoe@secacct-practice-lab:/home/alice$ cd
janedoe@secacct-practice-lab:~$
"The path in the prompt changed back to a tilde again."
"Yup. You can also say cd ~
, of course, or you can do cd /home/janedoe
, all of which would have the same effect. But cd
on its own is enough. Plus, it's less to type."
"Okay, I can move around, and I can look in folders, but what about inside files? How do I read this book you're apparently writing? Can I just ls
the file?"
"Nope, ls
with a file instead of a directory as a path just tells you whether that file exists or not. Besides," Alice laughs, "there's not much to read yet, I have so much more work to do on my book. But to read it, you'll have to look at the file's contents itself, so we'll need a few other commands."
You look at Alice expectantly as she pauses.
"Okay, okay," she continues, "let's just get right into it then."
🚧 TK-TODO
Cover
mkdir
,touch
, and other basics.Then get into communicating with another user. The first tool for this should be
write(1)
, as it is the simplest. This is also the very first security issue: usemesg n
to disable messages from other users. Put this in a startup script (such as.profile
or.bash_login
) in order to disable write access to your STDERR file descriptor upon login.After that, we can do
talk
/talkd
, as well asntalk
,utalk
, or probably best of all for now,ytalk
.
- GECOS information using
chfn(1)
..pgpkey
,.project
, and.plan
, files, forfinger(1)
, see http://www.catb.org/jargon/html/P/plan-file.html
🚧 TK-TODO
- MIT Terminus - Text adventure game to promote learning about terminal command line interfaces. (Source)