Over­view

APT re­pos­it­ory

In order to be able to use the APT repository for your Debian installation, you generally need an activation by Rechnerbetrieb Mathematik.

 

Laptop with cable No restrictions after activation

 

Com­pute Ser­vice

What are com­pute serv­ers?

These are necessary for bigger calculations. RBM has so-called compute servers for these purposes. These are computers with comparatively high computing power and a lot of memory.

Employees of the Faculty of Mathematics (EIM-M) can use these servers. Please contact us.

If you want your programmes to not terminate on logout, the commands nohup and screen exist.

The names of the compute servers are known to the working groups and can be requested from the RBM if necessary.

Employees of the mathematics department with a corresponding AG membership have access to the compute servers via ssh only from the networks of the mathematics department.

On Linux systems, access is as follows

ssh <servername>

e.g. for the compute server euklid:

ssh euklid.math.paderborn University.de

But why are compute servers useful and how do I use them?

Prob­lems with long-run­ning pro­cesses and pro­grammes

Processes that perform complex calculations usually run for a very long time, possibly several days.

This has some consequences:

1. problems with the quota

You are logged in for a long time and your memory quota is full. Now effects can occur whose actual cause is difficult to recognise:

  • Mozilla no longer works, neither mail nor browser
  • Printing is no longer possible.
  • etc.

2. security problems

From time to time, security problems are detected in software, i.e. programming errors that allow unauthorised persons to, for example

  • read your mails
  • carry out attacks from your computer to other computers under your user account or your name.
  • etc.

RBM tries to close such gaps as soon as they occur, usually within one working day. It is often necessary to restart the computer.

To ensure that no data is lost, we first check whether anyone is logged in and working on the affected workstations. If this is the case, a message is displayed on the screen and the reboot is delayed. Follow the instructions in this message.

After two weeks, the computer is automatically restarted for your protection and the protection of your data.

In order not to lose any data, e.g. also in the event of power failures during longer running compute processes, it is recommended to use the compute servers.

Firstly, the compute servers are more powerful than standard workstation PCs and are also separately protected against power and hardware failures. They are also better protected in terms of security.

1. nohup

The nohup command enables console programmes to be started without being terminated when logging out.

The general use looks like the following:

nohup <command> ... &

For example, if you want to run the programme ./compute-mupad.sh in the current directory:

nohup ./compute-mupad.sh &

If the programme generates output on the console or XTerm during normal use, this will be in the file nohup.out in the current directory.

If you log out after starting the programme, it is possible to view the progress of the calculation in the nohup.out file at a later time.

nohup is not suitable for starting X applications or interactive console applications.

2. screen

Another alternative is the screen command . In contrast to nohup , screen also enables interactive console programmes to be started.


A so-called screen session is started by entering the following:

screen

The session starts with a screen that looks similar to the following:

The session window looks like this. Firstly, it is a shell like in any normal XTerm. In the lower part of the window you can see a status bar (white on blue). From left to right you can see the computer name, then the system load in brackets, then the date and original time and finally the names of the current subwindows.

Several sub-sessions called screens can exist in one screen session. When first started, there is only one screen no. 0 called bash.

Screen is generally controlled by a key combination starting with <Control-A> (English keyboard layout) or <Strg-A>on the German keyboard, i.e. Control or Ctrl key pressed together with the A key. In the following only called <C-a> . <C-a c> means first <Ctrl-A> and then the C key.

Below are the most important key commands:

Keyboard shortcuts Effect
C-a c Open new screen
C-a k Close unresponsive screen
C-a n Switch to the next screen
C-a p Switch to the previous screen
C-a A Edit the name of the screen
C-a d

Disconnect from the screen session, all screens in the session continue to run until they close themselves, the screen session is called up again or the computer is restarted.

Applications can now be started in the screens. Once all calculations have been started, it is possible to disconnect from the screen session. To do this, use the key combination <C-a d>.

You can then log out of the computer and the calculations will continue.

If you want to view the status of the calculations in the screen session at a later time, first log in to the computer on which the screen session was started via ssh . Then enter

screen -x

This reconnects you to the screen session and you can use the key commands to check the screen session.

Further information can be found in the Unix man page for screen, which can be opened on Linux computers with

man screen

on Linux computers.

The Linux pool rooms for math­em­at­ics

Mathematics operates a Linux pool in room D3.301.

To work remotely on one of the pool computers, an SSH or NX client is required.

Documentation on the institution of the x2go client is available here.

Access canonlyvia the gateway sommerfeld.math.uni-paderborn University.de.

The pool computers can then be accessed as <computer name>.math.uni-paderborn.de via ssh.

If a pool computer is switched off, it can be started with the command "boot <computer name>" on Sommerfeld.

  • skinner
  • waylon
  • lou
  • smithers
  • duff-man
  • edna
  • jeff
  • margin
  • ralph
  • flanders
  • clancy
  • patty
  • quimby
  • selma
  • apu
  • itchy
  • beard
  • homer
  • otto
  • jimbo
  • mr-burns
  • scratchy
  • nelson
  • lisa
  • martin

Re­com­men­ded soft­ware

Action

Software

Command

Command Description

Web browser

firefox

firefox

Good slim web browser

links

links

Console text browser

lynx

lynx

Consoles Text-Browser

CD/DVD burning

k3b

k3b

Simple CD/DVD burning software for KDE

cdrecord

cdrecord

Powerful CD burning software for the console

cdrdao

cdrdao

Also powerful burning programme on the console

TeX/LaTeX editors (frontends)

Kile

kile

KDE editor especially for LaTeX documents

Lyx

lyx

What-You-See-Is-What-You-Get Editor for LaTeX documents

View images

Gwenview

gwenview

Very comfortable image viewer based on ACDSee

Edit images

The Gimp

gimp

Complex image editing programme

View videos

mplayer

mplayer

Comprehensive playback programme for video files

gmplayer

Graphical user interface for mplayer

haruna

haruna

Rae's recommendation
Can play YouTube playlists

xine

xine

User-friendly playback programme for video files incl. graphical user interface

Email clients

alpine

alpine

Email client for the text console

Thunderbird

thunderbird

Graphical email client

Writing letters

OpenOffice

oowriter

Powerful word processing programme

Create slides

ooimpress

is used to create screen presentations

Create spreadsheets

oocalc

Powerful spreadsheet programme

Java IDE

Eclipse

eclipse

Complex Java IDE

Help for the VIM ed­it­or

Here are the most common commands in short form:

Set up Ker­ber­os cli­ent

Some services such as SSH can be used from home without being logged in to the terminal. It is recommended to install/configure Kerberos for this.

 

Quick reference:

Necessary packages: krb5-config krb5-user

Realm: MATH.PADERBORN UNIVERSITY.DE

Kerberos server: Does not need to be specified

Step by step instructions:

 

  1. Open a root shell:
  2. Install packages:
  3. Configuration:
  4. Test:

    You can now use the kinit command to get a ticket.

 

For a general understanding of Kerberos, we recommend our introduction.

Prob­lems log­ging in

There are two different cases of failed login attempts:

  1. After a short time, a window appears with the message:"Login incorrect; please try again"
  2. The login screen initially disappears, but reappears shortly afterwards.

Case 1: There are two possibilities:

  • You have forgotten or misremembered your password. (This happens again and again!)
  • Your login is blocked (there are various reasons for this).

It is then necessary in any case to contact the computer centre in room D2.301.

Case 2: The quota has been exceeded. (The personal data takes up too much space).

In this case, you can remedy the situation yourself. Logging in to the text terminal is then still possible.
It works like this:

  1. "CTRL-ALT-ENTF F1"
  2. Enter login+password (no placeholder is inserted for the password, don't be surprised!)

Files must now be deleted until the quota is no longer exceeded.
The most important commands:

  • quota -vs (Checks the quota)
  • du -k (How much space does a directory occupy?)
  • ls -l (Displays the size of files)
  • rm (to delete files)

Don't forget to log out afterwards! (Command: exit)

Then you should be able to log in again. Otherwise visit us in D2.301.

An increase of the quota can be requested at the computer operation.

Use of ex­tern­al data car­ri­ers

Using USB sticks on Linux computers

Mounting

Normally, an inserted USB stick is automatically recognised and mounted. A window should appear showing the contents of the stick. Otherwise, you can call it up via the file manager of the user interface (Nautilus/Thunar).

Unmounting

Normally, you can eject a USB stick via the respective file manager using the right-click menu. If this does not work, you must use the

console command pumount:

pumount /media/[name of USB stick]

Mount point

The USB stick with the respective name is mounted under /media:

/media/[name of the USB stick]

If a USB stick is not assigned a name, it is created with the default name disk.

Naming and folder creation is case-sensitive, therefore upper and lower case must be observed.

Why is my com­puter slow?

If your computer responds very slowly, check the utilisation of the PC and the existing processes with the command

user@client# top

 

To exit top again, press the q key. top shows you which intensive (utilisation of the CPU, main memory) processes are running on the computer.

 

The command w shows all users who are logged on to the PC:

 

user@client# w

 

If other people are also using the computer, let them know that their processes are interfering and that they should stop them. If the person is no longer logged in, it is probably due to incorrectly terminated processes. Please inform Computer Operations Mathematics and we will then terminate the processes.

 

If one of your own processes is the problem, terminate it. If this is not possible, use the command

 

user@client# ps -aux | grep your_login_name

 

to determine the process ID (PID). You can then use the command

 

user@client# kill PID

 

command to terminate the application. PID must be replaced by the previously determined process ID. If the process still cannot be terminated, the following may help

 

user@client# kill -9 PID

 

Further information can be found on the help pages for top and ps, which can be accessed with the commands

 

user@client# man top

 

and

 

user@client# man ps

 

can be displayed.

 

If it is no longer possible to use the computer on the console (the monitor remains black, you can no longer enter commands), try logging in from another computer via ssh:

 

user@client# ssh name_of_slow_down_computer

 

You can then try to kill your processes. Or inform the computer operation maths and provide us with all essential information (name of the computer and login, commands entered, error messages).

 

Please never simply switch a PC under Linux off and on again, as this procedure can damage the hard drive.

Ac­cess rights

Users:in­side and groups

Under UNIX, all users of the system are categorised into groups. A user can belong to several groups. One of the groups is the so-called primary group, which plays an important role when creating a file/directory. You can find out which groups you are a member of using the groups command:

Example:

gudrun@vieta[~]>>groups gudrun root fiz3 gdmaint mupmod mupdev modem muplib mupas sysadmin software mathnet gudrun@vieta[~]>>

Groups are assigned to users by the system administrator and can only be changed by them. You can temporarily change your own primary group to another group to which you belong: newgrp(newgroup) sets your primary group in the news shell to newGroup until you exit the shell, e.g. with CRTL-D.

Example:

gudrun@vieta[~/TEST]>>groups gudrun root fiz3 gdmaint mupmod mupdev modem muplib mupas sysadmin software mathnet gudrun@vieta[~/TEST]>>touch test-file1 gudrun@vieta[~/TEST]>>ll test-file1 -rw-r--r-- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>newgrp mathnet Loading standard modules...done. Loading additional modules from ~/.modulefilesrc basic pem gnu openwin X11 tetex done. gudrun@vieta[~/TEST]>>touch test-file2 gudrun@vieta[~/TEST]>>ll test-file2 -rw-r--r-- 1 gudrun mathnet 0 Apr 25 08:37 test-file2 gudrun@vieta[~/TEST]>>

Prop­er­ties of files and dir­ect­or­ies

Access to files and directories under UNIX is regulated by three user classes:

  • u for login user(the owner)
  • g for group(the corresponding group)
  • o for others(everyone who is not in the group)

Example:
gudrun@vieta[~/TEST]>>ls -al total 278 drwxr-xr-x 11 gudrun root 512 Apr 25 08:49 ./ drwxr-sr-x 58 gudrun mupas 4608 Apr 21 22:54 ../ [...] drwxr-xr-x 2 gudrun mupas 512 Apr 25 08:49 TEST-DIR/ -rw-r--r-- 1 gudrun root 0 Apr 25 08:37 test-file1 -rw-r--r-- 1 gudrun mathnet 0 Apr 25 08:37 test-file2 gudrun@vieta[~/TEST]>>

In this output of ls -al you will see seven blocks of information per file/directory. The first block consists of 10 characters and represents the type of file and its access rights. The second block is a number that indicates the number of existing links to the file/directory. The third block indicates the owner of the file, the fourth block the group that has access to this file. This is followed by the size of the file (in bytes), the last modification date and the name of the file/directory.

Ac­cess rights to files

In the first block of the output of ls -al, the first of the ten characters specifies the type of file/directory. A - means that it is a (normal) file. A d stands fordirectory, an l forlink.
Characters two to four specify the access rights for the owner of the file. Characters five to seven specify access rights for the other members of the group to which the file belongs. Characters eight to ten specify the access rights for all other users.

For each of the user classes, access for reading(read), writing(write) orexecuting (execute) can be set individually, meaning that a total of nine different access rights (protection bits) can be assigned per file/directory. The file access rights thus determine who is authorised to access the contents of the file and in what sense.

Example:

-rw-r--r-- 1 gudrun mathnet 0 Apr 25 08:37 test-file2

In this example, the access rights for test-file2 are -rw-r--r--. It is therefore a normal file. As the owner, the user gudrun has both read and write authorisation. All other members of the mathnet group only have read authorisation, as do all other users. They cannot change the content of the file. Nobody has execute permission (x), which should only be granted for executable files (i.e. files that contain programmes).

Ac­cess rights to dir­ect­or­ies

The access rights for a directory control access to the files and subdirectories it contains. As soon as you have access to a directory, the ability to read individual files or change their content is monitored by the file access rights. As with files, access to directories for reading(read), writing(write) orexecuting (execute) can be set individually for each user class. Compared to file access rights, there are two special features to note for directories:

  1. For directories, the execute permission (x) means that the corresponding users can access the directory, e.g. change to the directory or list the files in the directory with ls.
    Important: If a user is allowed to access a directory, they need the execute permission (x) for all higher-level directories up to the root (root directory:).
  2. Write permission to a directory means that authorised users can create and delete files.
    Important: In this case, it is possible to delete a file even if the corresponding group does not have any access rights to the file itself.

Change ac­cess rights

The access rights to a file/directory may only be changed by the owner:in the file/directory. Thechmod command(change mode) is used for this purpose. There are two syntactically different forms of chmod, but they have the same effect:

  1. Changing access rights using chmod w?y where the

    following can be set

    for

    w (user:inner class): u (user), g (group), o (other), a (all)
    ? (action) can be set: + (add right), - (remove right)
    y (access right) can be set: r (read), w (write), x (execute)

    Examples:

    gudrun@vieta[~/TEST]>>ls -al test-file1 -rw-r--r-- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>chmod g-r test-file1 gudrun@vieta[~/TEST]>>ls -al test-file1 -rw----r-- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>

    The group is no longer allowed to read the file.

    gudrun@vieta[~/TEST]>>ls -al test-file1 -rw-r--r-- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>chmod g-r test-file1 gudrun@vieta[~/TEST]>>ls -al test-file1 -rw----r-- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>

    All users are allowed to execute the file, the group is allowed to read again. Note that several assignments can be made with one command, separated by a comma.

    gudrun@vieta[~/TEST]>>ls -al [...] drwxr-xr-x 2 gudrun mupas 512 Apr 25 08:49 TEST-DIR/ gudrun@vieta[~/TEST]>>chmod o-x TEST-DIR/ gudrun@vieta[~/TEST]>>ls -al [....] drwxr-xr-- 2 gudrun mupas 512 Apr 25 08:49 TEST-DIR/

    Others (all those who are not group members) are no longer allowed to access the directory.
  2. Reassignment of all access rights by chmod ugo where the values for u,g,o are specified as follows:
    usergroupother
    read 4 4 4 4
    write 2 2 2
    execute 1 1 1

    The corresponding columns are totalled for the desired rights.
    Examples:

    gudrun@vieta[~/TEST]>>ls -al test-file1 -rwxr-xr-x 1 gudrun root 0 Apr 25 08:37 test-file1* gudrun@vieta[~/TEST]>>chmod 600 test-file1 gudrun@vieta[~/TEST]>>ls -al test-file1 -rw------- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>

    Only the owner:in of the file may read and modify the contents of the file.
  3. gudrun@vieta[~/TEST]>>ls -al test-file1 -rw------- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>chmod 640 test-file1 gudrun@vieta[~/TEST]>>ls -al test-file1 -rw-r----- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>

    The owners:in the file may read and change the contents of the file, the group members may read the contents but not change them, all others have no access rights.

    gudrun@vieta[~/TEST]>>ls -al test-file1 -rw-r----- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>chmod 664 test-file1 gudrun@vieta[~/TEST]>>ls -al test-file1 -rw-rw-r-- 1 gudrun root 0 Apr 25 08:37 test-file1 gudrun@vieta[~/TEST]>>

    The owners:in the file and all group members may read and modify the contents, all others may only read.

    gudrun@vieta[~/TEST]>>ls -al total 278 [...] drwxr-xr-- 2 gudrun mupas 512 Apr 25 08:49 TEST-DIR/ gudrun@vieta[~/TEST]>>chmod 755 TEST-DIR/ gudrun@vieta[~/TEST]>>ls -al total 278 [...] drwxr-xr-x 2 gudrun mupas 512 Apr 25 08:49 TEST-DIR/ gudrun@vieta[~/TEST]>>

    The owner:in has full access to the directory, the group and all others may only read in the directory (of course only the files that have the corresponding read permissions).

chmod can be used recursively in both forms with the -R option.

Pre­set ac­cess rights glob­ally

Each time a file/directory is created, the access rights preset by the system are set. This default setting can and should be adapted to your own requirements. In the maths network, the value of umask is set to 022 for each user:in in the .cshrc file, i.e. each file created by a user:in has full access rights for this user:in and read access rights for all others. Useful values of umask and their meaning for newly created files and directories are

umask value file Directory
022 -rw-r--r-- drwxr-xr-x
077 -rw------- drwx------
027 -rw-r----- drwxr-x---

Please adapt the value of umask to your requirements.

The umask command can of course also be used in the current shell. umask without an argument returns the currently valid setting of umask.

Example:

gudrun@vieta[~/TEST]>>umask 22 gudrun@vieta[~/TEST]>>touch test-file5 gudrun@vieta[~/TEST]>>ls -al test-file5 -rw-r--r-- 1 gudrun root 0 Apr 25 09:49 test-file5 gudrun@vieta[~/TEST]>>umask 077 gudrun@vieta[~/TEST]>>umask 77 gudrun@vieta[~/TEST]>>touch test-file6 gudrun@vieta[~/TEST]>>ls -al test-file6 -rw------- 1 gudrun root 0 Apr 25 09:49 test-file6 gudrun@vieta[~/TEST]>>

Important: If a file is copied with the cp command, the old access rights of the file are taken over, provided umask allows these access rights. Additional rights are never set, as a new file is created with the news access rights and the content of the original file is copied into it. However, if a file already exists that is overwritten by the copying process, its old access rights are retained:

Example:

gudrun@vieta[~/TEST]>>umask 77 gudrun@vieta[~/TEST]>>ls -al test-file* -rw-rw-r-- 1 gudrun root 0 Apr 25 10:02 test-file1 -rw------- 1 gudrun root 15 Apr 25 10:03 test-file6 gudrun@vieta[~/TEST]>>cp test-file1 test-file1-new gudrun@vieta[~/TEST]>>cp test-file6 test-file1 gudrun@vieta[~/TEST]>>ls -al test-file* -rw-rw-r-- 1 gudrun root 15 Apr 25 10:04 test-file1 -rw------- 1 gudrun root 0 Apr 25 10:04 test-file1-new -rw------- 1 gudrun root 15 Apr 25 10:03 test-file6 gudrun@vieta[~/TEST]>>

Change own­er­ship rights

The ownership of a file/directory can only be changed by the system administrator. The group membership of a file/directory can be changed by the respective owner:in the file using the command chgrp(changegroup). The syntax for this command is: chgrp With the option -R chgrp

Example:

gudrun@vieta[~/TEST]>>ls -al test-file* ls: No match. gudrun@vieta[~/TEST]>>touch test-file1 gudrun@vieta[~/TEST]>>ls -al test-file1 -rw------- 1 gudrun root 0 Apr 25 10:12 test-file1 gudrun@vieta[~/TEST]>>chgrp mupas test-file1 gudrun@vieta[~/TEST]>>ls -al test-file1 -rw------- 1 gudrun mupas 0 Apr 25 10:12 test-file1 gudrun@vieta[~/TEST]>>

Shar­ing dir­ect­or­ies

Groups often want to make files available centrally for all their group members. A directory that has full access rights for the group can be used for this purpose: Example:

gudrun@vieta[~/TEST]>>mkdir FUER_MUPAD gudrun@vieta[~/TEST]>>ls -al total 280 [...] drwx------ 2 gudrun root 512 Apr 25 10:22 FUER_MUPAD/ gudrun@vieta[~/TEST]>>chgrp mupas FUER_MUPAD/ gudrun@vieta[~/TEST]>>chmod 770 FUER_MUPAD/ gudrun@vieta[~/TEST]>>ls -al total 280 [...] drwxrwx--- 2 gudrun mupas 512 Apr 25 10:22 FUER_MUPAD/ gudrun@vieta[~/TEST]>>

Important: Please note the following in this case:

  1. Each of the group members can now create and delete files in the directory. It is also possible to delete a file even if group access is not permitted for this file.
  2. A file created by a group member belongs to this group member and is therefore counted towards their quota.
  3. A file created by a group member can still not be readable for the group. The file access rights must be set correctly for the group. In this case, check the value of umask (see Presetting access rights globally) or set the rights manually (see Changing access rights).
  4. A file created by a group member may still not be readable, as this person is a member of the correct group but has a different primary group (see under Users and groups) and the file was therefore created with the wrong group. In this case, only the owner can change the ownership rights in the file. Alternatively, they can avoid this problem by setting the so-called Set-GID bit on the directory. This means that all files created in the directory are automatically assigned the group membership of the directory.

    Example:

    gudrun@vieta[~/TEST]>>ls -al [...] drwxrwx--- 2 gudrun mupas 512 Apr 25 10:43 FUER_MUPAD/ gudrun@vieta[~/TEST]>>touch FUER_MUPAD/test-file1 gudrun@vieta[~/TEST]>>ls -al FUER_MUPAD/test-file1 -rw-r----- 1 gudrun root 0 Apr 25 10:44 FUER_MUPAD/test-file1 gudrun@vieta[~/TEST]>>chmod g+s FUER_MUPAD/ gudrun@vieta[~/TEST]>>ls -al [...] drwxrws--- 2 gudrun mupas 512 Apr 25 10:47 FUER_MUPAD/ gudrun@vieta[~/TEST]>> gudrun@vieta[~/TEST]>>touch FUER_MUPAD/test-file2 gudrun@vieta[~/TEST]>>ls -al FUER_MUPAD/test-file2 -rw-r----- 1 gudrun mupas 0 Apr 25 10:47 FUER_MUPAD/test-file2 gudrun@vieta[~/TEST]>>

  5. There can also be problems with access control for files that are writable for the group. If two people edit the same file at the same time, changes will be lost. Please remember to solve this problem organisationally (e.g. through clear agreements or by working exclusively on copies). A technically supported professional solution such as the use of a version control system (e.g. cvs) may also be useful.