1 00:00:01,110 --> 00:00:09,840 Operating systems in the Unix tradition differs from DOS in the MS-DOS traditions, and in that they 2 00:00:09,840 --> 00:00:14,940 are not only multitasking systems but also the multi-user systems. 3 00:00:14,940 --> 00:00:17,490 So what exactly does this means? 4 00:00:17,490 --> 00:00:23,550 If you are asking that, that it means that more than one person can be using a computer at the same 5 00:00:23,550 --> 00:00:24,090 time. 6 00:00:24,090 --> 00:00:32,130 So while a typical computer will likely have only one keyboard and monitor and mouse, it can still 7 00:00:32,130 --> 00:00:34,290 be used by more than one user. 8 00:00:34,290 --> 00:00:44,100 For example, if a computer attached to a network or internet remote users can log in via SSH, secure 9 00:00:44,100 --> 00:00:46,170 shell and operate the computer. 10 00:00:46,170 --> 00:00:52,680 In fact, remote users can execute graphical applications and have graphical output appear on the remote 11 00:00:52,830 --> 00:00:53,550 display. 12 00:00:53,550 --> 00:00:59,250 So the X window system supports this as a part of its basic design. 13 00:00:59,280 --> 00:01:06,130 The multi-user capability of Linux is not a recent innovative innovation, but rather a feature that 14 00:01:06,130 --> 00:01:09,610 is deeply embedded into the design of the operating system. 15 00:01:09,610 --> 00:01:15,310 Considering the environment in which the Unix was created, this makes perfect sense. 16 00:01:15,310 --> 00:01:21,040 Years ago, before computers were personal, they were larger, expensive and centralized. 17 00:01:21,040 --> 00:01:28,990 So a typical university computer system, for example, consists of a large central computer located 18 00:01:29,380 --> 00:01:34,270 in one building and terminals that were located throughout on the campus, for example. 19 00:01:34,270 --> 00:01:43,270 This is our computer and this is our terminals that is located throughout our university campus. 20 00:01:44,350 --> 00:01:52,540 So each and each of these nodes connected to the large central computer, which in this case it's our 21 00:01:52,540 --> 00:01:54,190 large central computer, is this. 22 00:01:54,390 --> 00:01:55,300 So. 23 00:01:56,760 --> 00:01:58,320 Now to make this practical. 24 00:01:59,450 --> 00:02:04,440 A method had to be devised to protect the users from each other. 25 00:02:04,480 --> 00:02:04,970 Right. 26 00:02:04,970 --> 00:02:10,910 So after all, the actions of one user could not be affected. 27 00:02:11,030 --> 00:02:16,040 Actions of one user cannot be affected by. 28 00:02:16,880 --> 00:02:17,190 Um. 29 00:02:18,720 --> 00:02:19,620 Many users. 30 00:02:19,620 --> 00:02:24,780 So here, let's actually draw our person right here. 31 00:02:24,780 --> 00:02:34,050 So the action of our one user could not be allowed to crash the computer nor couldn't kill could one 32 00:02:34,050 --> 00:02:36,060 user interface with the files. 33 00:02:36,060 --> 00:02:42,210 For example, this is belonging with our this username is Max and this is Carl. 34 00:02:42,390 --> 00:02:51,120 So the Carl could not access our Max files or Max cannot access Carl's files. 35 00:02:51,120 --> 00:02:52,170 So that's it. 36 00:02:52,170 --> 00:02:57,780 That's a that's it with our user permissions which you will learn in this section. 37 00:02:57,780 --> 00:03:00,660 So to make this practical. 38 00:03:02,210 --> 00:03:05,540 You will learn the ID command. 39 00:03:05,660 --> 00:03:07,970 Actually, let me delete all of this. 40 00:03:07,970 --> 00:03:14,880 And so in this lecture you will learn about the I'd command in terminal. 41 00:03:14,900 --> 00:03:19,330 So this ID command we are going to use to display the user identity identity. 42 00:03:19,610 --> 00:03:24,960 You will learn also learn about the C harsh mode command. 43 00:03:24,980 --> 00:03:29,090 So this command will change a file's mode. 44 00:03:29,120 --> 00:03:30,350 You will also learn. 45 00:03:30,350 --> 00:03:31,490 You mask. 46 00:03:31,520 --> 00:03:32,930 You mask. 47 00:03:35,170 --> 00:03:40,030 And this u-mask we're going to use this u-mask command to set the default file permission. 48 00:03:40,030 --> 00:03:52,060 You will learn about the sudo sudo the sudo is to execute a command as another user, but su means run 49 00:03:52,060 --> 00:03:54,400 a shell as another user. 50 00:03:54,400 --> 00:04:00,190 So you will learn about these differences between su and sudo in this section. 51 00:04:00,190 --> 00:04:03,160 And then also you will learn about three. 52 00:04:03,920 --> 00:04:16,310 Thermal commands, which is c hard o w n which this will change the file's owner and c h. 53 00:04:17,160 --> 00:04:20,100 G r p. 54 00:04:20,460 --> 00:04:25,050 Also, this will change a file's group ownership. 55 00:04:25,380 --> 00:04:28,470 And we also have P. 56 00:04:28,500 --> 00:04:31,050 Actually, let me write this right down here. 57 00:04:31,230 --> 00:04:33,120 So we will also learn. 58 00:04:33,150 --> 00:04:38,970 P a s s w d which. 59 00:04:39,630 --> 00:04:43,850 With this command, you can change a user's password. 60 00:04:43,890 --> 00:04:50,700 In next lecture, you will learn about the Jonas Group members and everybody else in Cali in General 61 00:04:50,700 --> 00:04:51,510 Linux systems. 62 00:04:51,510 --> 00:04:53,520 So I'm waiting you in next lecture.