Basic Unix
| ``Hey, it's Unix! I know this!'' - Lex, Jurassic Park |
Many of us folks who actually work with Unix a lot rolled our eyes at this point in the movie. Lex was using a mouse to move around and click on graphical images on the computer screen, none of which seemed to require any acquaintance with Unix.
In general, Unix computers may not have as good a graphical interface (windows, menus, folders, icons, etc.) as a Macintosh computer. But that's OK. We still tend to do different things on the Unix workstations than we would on a Mac/PC. Many times it's easier, or just as easy, to type a command as to fiddle with mouse/windows/menus. (Lines of distinction are becoming blurred -- new Macs actually are based on Unix, while the graphical interface of newer Linux versions are feeling more like other familiar systems -- and both can emulate Windows.) Anyway, the real strengths of Unix lie elsewhere. |
|---|
|
|
|
The power of the basic Unix commands increases tenfold when combined with the succinct Unix syntax. The output from one command can be directed into a new file, or appended to an existing file, or passed along as input to another command. Wildcard characters let you specify multiple files. The semicolon separates multiple commands on a single line, and you can define your own simple aliases for often-used long Unix commands, in the special file .cshrc (located in your home directory). Also in .cshrc is the definition of your ``search path'' and other important system variables. |
|---|
|
|
Traditionally, you could connect to other computers using telnet and rlogin and (for transferring files from one computer to another) ftp. All three programs, however, are insecure; crackers (malicious hackers) can and do have programs that can intercept network traffic -- including passwords -- which then enables them to log on to computers and do malicious hacking in somebody else's name.
The Applied Math computers, like most computers on campus, have been hacked into now and then, which is why we now disallow (or at least discourage) the use of telnet & rlogin & ftp. Instead, secure versions are available: ssh and scp. These replace telnet and ftp, respectively, and cleverly encrypt/decrypt outgoing and incoming communications so that any hacker's ``sniffer program'' will hear only gibberish. Examples of usage: |
|---|
|
|
web pages
remote access
Unix syntax and special files




