O'Reilly logo

A Practical Guide to Red Hat® Linux® 8 by Mark G. Sobell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Advanced Exercises

11.Create a file named –x in an empty directory. Explain what happens when you try to rename it. How can you rename it?
12.Suppose that the working directory contains a single file named andor. What error message do you get when you run the following command line?
$ mv andor and\/or
								

Under what circumstances is it possible to run the command without producing an error?

13.The ls –i command displays a filename preceded by the inode number of the file (page 126). Write a command to output inode/filename pairs for the files in the working directory, sorted by inode number. (Hint: Use a pipe.)
14.Do you think that the system administrator has access to a program to decode user passwords? Why or why not (see exercise 6)?
15.Is it possible ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required