SlideShare a Scribd company logo
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
System Administration
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Key Knowledge Areas
Create links.
Identify hard and/or softlinks.
Copying versus linking files.
Use links to support system administration tasks.
Devices, Linux Filesystems, Filesystem Hierarchy Standard
Create and change hard and symbolic links
Terms and Utilities
ln
2
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
Disk file format
3
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
Disk Block Groups
4
• On the physical drive, information is stored in blocks
• The first block is always the boot block
• The rest of the blocks are pooled and organized into block groups
• Each block groups contains a copy of super block and descriptions of all the block groups
• Superblock holds information on the entire filesystem
• Block and inode bitmaps provide fast lookup info on free and allocated blocks and inodes
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
Disk Block Groups
5
• The inode table holds all of the inodes
• The data blocks contain the actual data that is contained in the files on the filesystem
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
inodes
6
Inodes, or Information Nodes, hold all of the meta information for a file
Details about ownership, size, permissions, times, ACLs and more are stored in the inode.
Most importantly,
the inode points to data blocks which store the contents of the file.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
inodes
7
File Name of a file isn’t stored in a inode. That’s where directories come in...
A directory is a special type of file whose contents (in the data blocks) is a list of name/inode
pairs.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Hard link
hard link maintains the same permissions and access times of the original file
both have same inode number - simply appears to have different filename and/or location
8
Create and change hard and symbolic links
•Changes to either the original file or the link affect both.
•The two files have equal importance. But deleting either of files won’t affect the other.
•Hard link files appear to be regular files when examined and they function this way as
well
• Normal users can’t create hard links to directories.
• Also, hard links aren’t allowed to span file systems
To create a hard link, use the ln command
# ln stuff2 /home/angie/stuff
# ls –al
-rw-r--r-- 2 root root 89704 Aug 27 2000 stuff
-rw-r--r-- 2 root root 89704 Aug 27 2000 stuff2
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
Hard links
9
• When a new hard link is created, it simply adds another reference (filename) in a directory to that
inode (file)
• Removing a hard link does not remove file unless it was the only hard link to that inode
• Hard links, due to their nature with inodes and directories, only operate within a filesystem - you can
not create a hard link from one filesystem to another
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Symbolic link
Users can create symbolic links to directories, and symbolic links can span file systems.
10
Create and change hard and symbolic links
• Symbolic link maintains permissions separate from those of the original file.
• Deleting the original file won’t remove the symbolic link, but the link wont funtion.
To create a soft link, you use the ln command.
# ln –s stuff /home/angie/stuffEx:
Soft links can be identified by listing the details of a directory’s contents:
# ls –al
lrwxrwxrwx 1 angie angie 7 Mar 10 17:06 stuff -> /fun/stuff
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
Symbolic links
11
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
Symbolic Links to Different File Systems
12
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create and change hard and symbolic links
Multiple Links to One File
13
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Fim de sessão
14

More Related Content

PPTX
SOC Cyber Security
PDF
Présentation ELK/SIEM et démo Wazuh
PPT
Active directory
PPT
Policy formation and enforcement.ppt
PDF
Linux Servers
PPTX
Chapter 11: Information Security Incident Management
PPTX
Ch22-Software Engineering 9
SOC Cyber Security
Présentation ELK/SIEM et démo Wazuh
Active directory
Policy formation and enforcement.ppt
Linux Servers
Chapter 11: Information Security Incident Management
Ch22-Software Engineering 9

What's hot (20)

PPTX
Systems Administration
PPTX
Red hat ppt
PPTX
Linux administration
PPT
VMware Esx Short Presentation
PPTX
Disaster Recovery Plan / Enterprise Continuity Plan
PPTX
security onion
PDF
Cloud managed services offerings
PDF
Cloud Management
PDF
Cisa domain 1
PPTX
Security Information and Event Management (SIEM)
PDF
Best Practices in Disaster Recovery Planning and Testing
PPTX
Open source SOC Tools for Home-Lab
PDF
Vulnerability and Patch Management
PDF
Intelligent MSP Presentation.pdf
PDF
Data Loss Threats and Mitigations
PDF
Data Center Infrastructure Management Powerpoint Presentation Slides
PPTX
PPTX
halstead software science measures
PDF
Application Security - Your Success Depends on it
PPTX
Windows server
Systems Administration
Red hat ppt
Linux administration
VMware Esx Short Presentation
Disaster Recovery Plan / Enterprise Continuity Plan
security onion
Cloud managed services offerings
Cloud Management
Cisa domain 1
Security Information and Event Management (SIEM)
Best Practices in Disaster Recovery Planning and Testing
Open source SOC Tools for Home-Lab
Vulnerability and Patch Management
Intelligent MSP Presentation.pdf
Data Loss Threats and Mitigations
Data Center Infrastructure Management Powerpoint Presentation Slides
halstead software science measures
Application Security - Your Success Depends on it
Windows server
Ad

Viewers also liked (20)

PDF
Lecture1 2 intro-unix
PPT
Compression Commands in Linux
PPT
Basic Linux kernel
PPT
Memory management in linux
PDF
Managing your data - Introduction to Linux for bioinformatics
PDF
Course 102: Lecture 11: Environment Variables
PPT
Linux ppt
PPT
Unit 3
PPTX
Shell scripting
PPTX
Linux Memory Management
PDF
Intro to Linux Shell Scripting
PPT
Unix Shell Scripting Basics
PPT
Shell Scripting in Linux
PPT
Shell programming
PDF
Process management
PDF
Unix Shell Scripting
PPT
Unix/Linux Basic Commands and Shell Script
PDF
Memory management in Linux kernel
PDF
Shell Scripting
PDF
Lecture1 2 intro-unix
Compression Commands in Linux
Basic Linux kernel
Memory management in linux
Managing your data - Introduction to Linux for bioinformatics
Course 102: Lecture 11: Environment Variables
Linux ppt
Unit 3
Shell scripting
Linux Memory Management
Intro to Linux Shell Scripting
Unix Shell Scripting Basics
Shell Scripting in Linux
Shell programming
Process management
Unix Shell Scripting
Unix/Linux Basic Commands and Shell Script
Memory management in Linux kernel
Shell Scripting
Ad

Similar to 4.6 create and change hard and symbolic links v2 (20)

PPT
101 4.6 create and change hard and symbolic links v2
PPT
101 4.6 create and change hard and symbolic links
PDF
Mounting and Creating Links - RHCSA (RH124) .pdf
PDF
Chip Designer's Code - Linux Terminal Part 3 - File Handling
PPT
linux-file-system01.ppt
PDF
Course 102: Lecture 5: File Handling Internals
PPTX
Managing files chapter 7
PPTX
Managing files chapter 7
PPT
managing-the-linux-file-system________________________
PPT
managing-the-linux-file-system_suse_.ppt
PDF
Linux Fundamentals and how to use linux.pdf
PDF
PPT
101 3.8 perform basic file editing operations using vi
PPT
101 3.8 perform basic file editing operations using vi
PDF
Programming Embedded linux
PDF
beginner.en.print
PDF
beginner.en.print
PDF
beginner.en.print
PPT
3.8 perform basic file editing operations using vi
PPTX
Examining Linux File Structures
101 4.6 create and change hard and symbolic links v2
101 4.6 create and change hard and symbolic links
Mounting and Creating Links - RHCSA (RH124) .pdf
Chip Designer's Code - Linux Terminal Part 3 - File Handling
linux-file-system01.ppt
Course 102: Lecture 5: File Handling Internals
Managing files chapter 7
Managing files chapter 7
managing-the-linux-file-system________________________
managing-the-linux-file-system_suse_.ppt
Linux Fundamentals and how to use linux.pdf
101 3.8 perform basic file editing operations using vi
101 3.8 perform basic file editing operations using vi
Programming Embedded linux
beginner.en.print
beginner.en.print
beginner.en.print
3.8 perform basic file editing operations using vi
Examining Linux File Structures

More from Acácio Oliveira (20)

PPTX
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
PPTX
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
PPTX
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
PPTX
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
PPTX
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
PPTX
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
PPTX
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
PPTX
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
PPTX
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
PPTX
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
PPTX
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
PPTX
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
PPTX
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
PPTX
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
PPTX
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
PPTX
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
PPTX
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
PPTX
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
PPTX
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
PPTX
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
MIND Revenue Release Quarter 2 2025 Press Release
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Building Integrated photovoltaic BIPV_UPV.pdf

4.6 create and change hard and symbolic links v2