UNIVERSITE CLAUDE BERNARD LYON 1



Documents pareils
Instructions Mozilla Thunderbird Page 1

that the child(ren) was/were in need of protection under Part III of the Child and Family Services Act, and the court made an order on

Application Form/ Formulaire de demande

TABLE DES MATIERES A OBJET PROCEDURE DE CONNEXION

Contents Windows

WEB page builder and server for SCADA applications usable from a WEB navigator

Exercices sur SQL server 2000

Installer un domaine DNS

Instructions pour mettre à jour un HFFv2 v1.x.yy v2.0.00

How to Login to Career Page

Principe de TrueCrypt. Créer un volume pour TrueCrypt

Supervision et infrastructure - Accès aux applications JAVA. Document FAQ. Page: 1 / 9 Dernière mise à jour: 15/04/12 16:14

APPENDIX 6 BONUS RING FORMAT

Contrôle d'accès Access control. Notice technique / Technical Manual

Utiliser une WebCam. Micro-ordinateurs, informations, idées, trucs et astuces

Guide d'installation rapide TFM-560X YO.13

Notice Technique / Technical Manual

Thank you for choosing the Mobile Broadband USB Stick. With your USB Stick, you can access a wireless network at high speed.

GAME CONTENTS CONTENU DU JEU OBJECT OF THE GAME BUT DU JEU

Lesson Plan Physical Descriptions. belle vieille grande petite grosse laide mignonne jolie. beau vieux grand petit gros laid mignon

BAP E Gestionnaire de parc informatique et télécommunications MI2 / MI3 Ouverts au titre de 2010 Arrêté du 7/04/10 - J.

Once the installation is complete, you can delete the temporary Zip files..

Practice Direction. Class Proceedings

Support Orders and Support Provisions (Banks and Authorized Foreign Banks) Regulations

calls.paris-neuroscience.fr Tutoriel pour Candidatures en ligne *** Online Applications Tutorial

First Nations Assessment Inspection Regulations. Règlement sur l inspection aux fins d évaluation foncière des premières nations CONSOLIDATION

RULE 5 - SERVICE OF DOCUMENTS RÈGLE 5 SIGNIFICATION DE DOCUMENTS. Rule 5 / Règle 5

AMENDMENT TO BILL 32 AMENDEMENT AU PROJET DE LOI 32

Chapitre VIII : Journalisation des événements

DOCUMENTATION - FRANCAIS... 2

If you understand the roles nouns (and their accompanying baggage) play in a sentence...

DOCUMENTATION - FRANCAIS... 2

Règlement sur le télémarketing et les centres d'appel. Call Centres Telemarketing Sales Regulation

I. Programmation I. 1 Ecrire un programme en Scilab traduisant l organigramme montré ci-après (on pourra utiliser les annexes):

Table des matières. 1. Installation de VMware ESXI Pré-requis Installation... 3

THE LAW SOCIETY OF UPPER CANADA BY-LAW 19 [HANDLING OF MONEY AND OTHER PROPERTY] MOTION TO BE MOVED AT THE MEETING OF CONVOCATION ON JANUARY 24, 2002

Package Contents. System Requirements. Before You Begin

Tammy: Something exceptional happened today. I met somebody legendary. Tex: Qui as-tu rencontré? Tex: Who did you meet?

Thank you for choosing the Mobile Broadband USB Stick. With your USB Stick, you can access a wireless network at high speed.

Gestion des prestations Volontaire

Credit Note and Debit Note Information (GST/ HST) Regulations

Editing and managing Systems engineering processes at Snecma

Le passé composé. C'est le passé! Tout ça c'est du passé! That's the past! All that's in the past!

SERVEUR DÉDIÉ DOCUMENTATION

VTP. LAN Switching and Wireless Chapitre 4

et Active Directory Ajout, modification et suppression de comptes, extraction d adresses pour les listes de diffusion

Dans une agence de location immobilière...

Compléter le formulaire «Demande de participation» et l envoyer aux bureaux de SGC* à l adresse suivante :

VoD ( Video on Demand ) avec VLC

FÉDÉRATION INTERNATIONALE DE NATATION Diving

Les techniques de la télémaintenance

Cheque Holding Policy Disclosure (Banks) Regulations. Règlement sur la communication de la politique de retenue de chèques (banques) CONSOLIDATION

ETABLISSEMENT D ENSEIGNEMENT OU ORGANISME DE FORMATION / UNIVERSITY OR COLLEGE:

3615 SELFIE. HOW-TO / GUIDE D'UTILISATION

Comprendre l impact de l utilisation des réseaux sociaux en entreprise SYNTHESE DES RESULTATS : EUROPE ET FRANCE

Institut français des sciences et technologies des transports, de l aménagement

WiFi Security Camera Quick Start Guide. Guide de départ rapide Caméra de surveillance Wi-Fi (P5)

Contrôle d accès Access control MOD-TCPIP-AI. Notice technique / Technical Manual

Micro-ordinateurs, informations, idées, trucs et astuces utiliser le Bureau à distance

1.The pronouns me, te, nous, and vous are object pronouns.

NOTICE INSTALLATION. ARCHANGE Simplex Office N&B/Couleur KONICA MINOLTA BUSINESS SOLUTIONS FRANCE

ONTARIO Court File Number. Form 17E: Trial Management Conference Brief. Date of trial management conference. Name of party filing this brief

Tex: The book of which I'm the author is an historical novel.

POLICY: FREE MILK PROGRAM CODE: CS-4

1 Configuration des Fichiers Hosts, Hostname, Resolv.conf

Archived Content. Contenu archivé

Acce s aux applications informatiques Supply Chain Fournisseurs

sshgate Patrick Guiran Chef de projet support

PARIS ROISSY CHARLES DE GAULLE

Exemple PLS avec SAS

DOCUMENTATION MODULE BLOCKCATEGORIESCUSTOM Module crée par Prestacrea - Version : 2.0

lundi 3 août 2009 Choose your language What is Document Connection for Mac? Communautés Numériques L informatique à la portée du Grand Public

CONVENTION DE STAGE TYPE STANDART TRAINING CONTRACT

Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.

The new consumables catalogue from Medisoft is now updated. Please discover this full overview of all our consumables available to you.

TP LINUX : LINUX-SAMBA SERVEUR DE FICHIERS POUR UTILISATEURS WINDOWS

FCM 2015 ANNUAL CONFERENCE AND TRADE SHOW Terms and Conditions for Delegates and Companions Shaw Convention Centre, Edmonton, AB June 5 8, 2015

Installation d'un TSE (Terminal Serveur Edition)

Paxton. ins Net2 desktop reader USB

CLIM/GTP/27/8 ANNEX III/ANNEXE III. Category 1 New indications/ 1 re catégorie Nouvelles indications

COUNCIL OF THE EUROPEAN UNION. Brussels, 18 September 2008 (19.09) (OR. fr) 13156/08 LIMITE PI 53

Surveillance de Scripts LUA et de réception d EVENT. avec LoriotPro Extended & Broadcast Edition

INDIVIDUALS AND LEGAL ENTITIES: If the dividends have not been paid yet, you may be eligible for the simplified procedure.

REMBO Version 2.0. Mathrice 2004 DESCRIPTION MISE EN OEUVRE CONCLUSION.

France SMS+ MT Premium Description

Vanilla : Virtual Box

Règles et paramètres d'exploitation de Caparmor 2 au 11/12/2009. Pôle de Calcul Intensif pour la mer, 11 Decembre 2009

GIGABIT PCI DESKTOP ADAPTER DGE-530T. Quick Installation Guide+ Guide d installation+

AIDE FINANCIÈRE POUR ATHLÈTES FINANCIAL ASSISTANCE FOR ATHLETES

UML : Unified Modeling Language

INSTALLATION DE WINDOWS 2000 SERVER POUR BCDI3. par. G.Haberer, A.Peuch, P.Saadé

Guide pour l Installation des Disques Durs SATA et Configuration RAID

PROJET DE LOI. An Act to Amend the Employment Standards Act. Loi modifiant la Loi sur les normes d emploi

Nouveautés printemps 2013

Configurer la supervision pour une base MS SQL Server Viadéis Services

SNMP for cloud Jean Parpaillon. SNMP4cloud - 1

Acronymes et abréviations. Acronymes / Abbréviations. Signification

FICHE D INSCRIPTION ET FICHE D INFORMATION MEDICALE POUR ELEVES LYCEE FRANÇAIS INTERNATIONAL

IDENTITÉ DE L ÉTUDIANT / APPLICANT INFORMATION

Transcription:

UNIVERSITE CLAUDE BERNARD LYON 1 Concours Externe ASSISTANT INGENIEUR BAP E Gestionnaire de parc informatique et télécommunications Session 2010 Nom :.. Nom de jeune fille:.. Prénom :.. Date de naissance :... EPREUVE D ADMISSIBILITE - Durée : 3h Coefficient 4 Jeudi 29 avril 2010 INSTRUCTIONS Ce sujet comporte 23 pages. Vous devez vérifier en début d épreuve le nombre de pages de ce fascicule et le matériel mis à disposition. L usage de la calculatrice ou tout autre document ou matériel est interdit. Ne pas écrire au crayon à papier. Les réponses doivent obligatoirement être faites sur les feuilles du sujet dans les espaces prévus. Il vous est rappelé que votre identité ne doit figurer que dans la partie supérieure de la bande à en tête de la copie mise à votre disposition (1 ère page). Toute mention d identité ou tout signe distinctif porté sur toute autre partie de la copie (ou les copies) mènera à l annulation de votre épreuve. 1

DOSSIER TECHNIQUE Les réponses doivent être courtes et claires. Les réponses «Systèmes» doivent être données en mode ligne de commande uniquement. RESEAU Le proxy, le smtp, le dns sont dans le domaine «domaine.fr» Sur PC1, on exécute la commande suivante : telnet smtp.domaine.fr 25 Le résultat de la commande est : Trying 193.110.123.18 Connected to smtp.domaine.fr En étant connecté sur le routeur/pare-feu, on exécute la commande suivante : show ip route Le résultat de la commande est : C 193.110.123.0/25 directly connected C 193.110.123.128/25 directly connected C 193.110.124.0/24 directly connected D 0.0.0.0/0 via 193.110.25.12 Depuis PC1, on exécute la commande suivante : traceroute dns.domaine.fr Le résultat de la commande est : 1, 1ms, 193.110.124.254 2, 3ms, 193.110.123.20 2

1. Quelle est l adresse de diffusion du réseau de la DMZ? 2. Quel est le masque du réseau de la DMZ? 3. Quelle est l adresse du réseau Administratif? 4. Quelle est la passerelle du réseau Administratif? 5. Vous souhaitez intercaler entre PC1 et la prise réseau murale un téléphone IP dans un réseau spécifique (10.110.123.0/24). Quelles sont les normes que doit supporter le commutateur? MATERIEL 6. Qu apporte un commutateur POE par rapport à un commutateur classique? 7. Quelle est la principale différence technique entre des disques SSD et des disques durs traditionnels? 8. Quelles sont les différentes vitesses de rotation des disques durs SCSI? 9. Quelle technologie matérielle préconiseriez-vous pour réduire l encombrement des serveurs? 10. Qu apporte le label RoHS? 3

SYSTEME / ADMINISTRATION 11. Que signifie l acronyme P.R.A.? 12. Au démarrage, votre ordinateur affiche «S.M.A.R.T error», et le système d exploitation démarre sans problème. Qu est-ce que cela signifie et que faitesvous? 13. Comment feriez-vous pour ouvrir un document en.docx sous Office 2003? 14. Dans un environnement hétérogène, afin de fournir un nombre limité de licences de logiciels et les rendre accessibles pour l ensemble du parc de machines, quel type de service peut être mis en place? 15. A l aide de la commande unix «ps», comment obtenez-vous la liste des processus dont la ligne de commande contient httpd? 16. Sous unix, dans quel répertoire, de manière générale, se trouve les traces d activité des services? 17. Un administrateur souhaite se connecter à distance sur un poste linux dans un environnement sécurisé. Quels outils et protocoles utiliser pour effectuer cette opération? 18. Quelle commande permet d exécuter un programme en prenant les privilèges d un autre utilisateur? Sous windows : Sous Linux : Sous Mac OS 10.X : 19. Quelle commande faut-il utiliser pour obtenir les informations IP de toutes les cartes réseaux? Sous windows : Sous Linux : Sous Mac OS 10.X : 4

20. Afin d être le plus efficace possible, quelle solution adopteriez-vous pour installer un nouveau logiciel sur 60 pcs windows en réseau sous Active Directory? 21. Décrivez ce que fait la commande suivante (cf. annexe : extrait de man find ) : find /home/ -name "*.mp3" -mtime +180 -exec rm -fr {} \; 22. Quel est l usage du PXE? 23. Vous êtes sur un réseau où le service WPAD est activé, à quoi sert-il? 24. Qu est-ce qu une DLL sous windows? Quel est l équivalent sous unix? SECURITE 25. Un utilisateur vous demande de lui installer une borne wifi dans son bureau. Quel impact la satisfaction de sa demande peut-elle avoir sur le réseau? 26. Qu est-ce qu un CIL dans un établissement public? 27. Pour utiliser un applicatif de téléchargement de logiciels, l administrateur ne souhaite plus utiliser des login et mot de passe pour les utilisateurs. Dans le cadre d un protocole sécurisé d authentification des utilisateurs, que proposeriez-vous comme solution? 5

28. Quel est le responsable juridique de la sécurité des systèmes d information d un établissement d enseignement supérieur? WEB 29. A quoi sert la configuration du «virtual host» sous Apache? 30. Que veut dire le s de https? Quel module apache doit être activé sur le serveur? Comment l utilisateur peut-il vérifier la validité de l identité du site web? 31. Quel est l apport d Ajax dans une application web? 32. Qu est ce qu un CMS? BASE DE DONNEES Vous avez à travailler sur la base de données existante décrite ci-dessous. Sa structure est la suivante : Table Personnels : NumEmployé : entier clé primaire, les autres champs sont texte Table Ordinateurs : Logiciel entier clé primaire, les autres champs sont texte Table Logiciels : RéfLogiciel : entier clé primaire, les autres champs sont texte 6

Son contenu est : 7

Requêtes SQL Rédigez les requêtes en SQL avec écriture sur plusieurs lignes pour plus de lisibilité. 33. Quels sont les noms et numéro d employé des personnels sans ordinateur? 34. Donner la liste des ordinateurs de l entreprise avec le nom du service et le grade de l utilisateur, le résultat sera classé par ordre décroissant du nom des ordinateurs. 35. Donner la requête SQL permettant de supprimer de la table Ordinateurs les lignes où l adresse IP est vide. 36. Quelle modification de la structure de la base proposez-vous pour une modélisation qui évitera les redondances? 37. Dans le cas ci-dessus, pourquoi faut-il éviter les redondances? 8

QCM Cochez une case et une seule par question. Le barème du QCM s établit comme suit : Une bonne réponse vaut 1 point ; Pas de réponse vaut 0 point ; 1 point est retranché en cas de mauvaise réponse. La note globale du QCM ne pourra pas être négative. Question 1 : Que signifie l acronyme CSS? Coherent Script Selection Central Synchronisation Service Cascading Style Sheet Cache Storage System Question 2 : A quoi servent les jointures dans une base de données? A valider le schéma A relier les identifiants de même nom A associer des identifiants identiques de même nature A faire un tri Question 3 : Le port d un service réseau est 110. A quel service cela correspond-il? FTP IMAP POP3 SNMP Question 4 : A quoi sert le W3C? Recenser des sites web Promouvoir les standards du web Héberger des sites web racines Développer le serveur web Apache Question 5 : Quel est le débit du port USB2.0? 56 Kbps 1 Mbps 480 Mbps 54 Gbps Question 6 : Parmi ces protocoles, lequel n est pas sécurisé? DFS IPSec IMAPS SSH 9

Question 7 : Que signifie le terme «CRI» dans un établissement d enseignement supérieur? une Circulaire de Responsabilité Interne une Charte du Respect des Informaticiens un usager mécontent un Centre de Ressources Informatiques Question 8 : En base de données, la transformation d un MCD en MLD permet de créer les clés étrangères. permet de créer une copie du MCD. permet de valider le schéma. permet d optimiser les temps d accès. Question 9: Quel type de programmation n existe pas? Programmation orientée objet Programmation procédurale Programmation fonctionnelle Programmation dérivative Question 10 : Que signifie l acronyme DNS? Domain Name Software Distributed Network System Domain Name System Distributed Name Socket Question 11 : Quels sont les 3 principes fondamentaux de la SSI? Stockage, sauvegarde, archivage Disponibilité, intégrité, confidentialité Organisation, classification, contrôle Fiabilité, accessibilité, confidentialité Question 12 : Une machine dispose de 6 disques de 200 Go chacun. Ces disques sont montés en RAID5 avec un «hot-spare». Quel est l espace disque utilisable? 200 Go 1 To 800 Go 1,2 To Question 13 : Un groupe de travail a besoin de rédiger une documentation en ligne de manière collaborative. Quel type d outil Web pouvez-vous lui proposer? Forum Wiki CMS Word 10

Question 14 : Quel outil n est pas un logiciel de gestion de versions de code? CVS Subversion PVM git Question 15 : Dans la liste suivante, quelle base de données est issue du monde libre? DB2 Oracle SQL Server PostgreSQL Question 16 : Combien d adresses IP disponibles peut-on affecter dans le sous-réseau 130.68.0.0 avec un masque 255.255.248.0? 256 2046 2048 4096 Question 17 : Vous devez rajouter un serveur dans votre sous-réseau, cette nouvelle machine se trouve à 320m de votre installation. Quel type de câble est le mieux adapté pour connecter ce serveur au réseau? STP UTP Coaxial Fibre optique Question 18 : Lequel de ces hyperviseurs est payant? Virtual Box vsphere Q (Qemu) ESXi Question 19 : Que signifie le sigle LDAP? Large Data Address Protocol Linux Directory Active Path Lightweight Directory Access Protocol License Datacenter Access Protocol Question 20 : A quoi sert un dispositif SSO? à fournir un système d authentification unique à donner des droits d accès à une ressource à apposer une signature automatique à signer les messages électroniques 11

Question 21 : Quel diagramme n appartient pas à UML? Diagramme de classes Diagramme d activités Diagramme de fonctions Diagramme d états Question 22 : Lequel de ces protocoles est utilisable pour de l authentification? 802.1x 802.11g RFC-1213 802.1q Question 23 : Parmi ces débits, lequel n existe pas en «fiber channel»? 2 Gbps 4 Gbps 6 Gbps 8 Gbps Question 24 : Parmi ces protocoles, lequel permet de partager en natif et en lecture-écriture une zone de stockage entre machines linux et windows? SNMP CIFS NTP SMTP Question 25 : Pour mettre en place un système RAID de plus de 4 To, quel système de fichiers conviendrait parmi les suivants? NTFS FAT HFS EXT4 Question 26 : Quel est l acronyme qui n est pas en rapport avec le Wifi? WAP WEP WPA TKIP Question 27 : Quel langage permet de manipuler de manière très concise les chaînes de caractères et les fichiers? ADA Java Perl Visual Basic 12

Question 28 : Laquelle de ces commandes permet de créer un ou plusieurs répertoires? chdir mkrep rmdir mkdir Question 29 : Sous windows laquelle de ces commandes permet de lancer l émulateur DOS? cmd dos terminal shell Question 30 : Laquelle de ces commandes permet d avoir un déport graphique sous une connexion distante sécurisée? telnet X toto@serveur.domaine.fr ssh X toto@serveur.domaine.fr ssh toto@serveur.domaine.fr https X toto@serveur.domaine.fr 13

ANALYSE DE SCRIPTS Décrivez précisément ce que font les scripts suivants et leur objectif : SCRIPT 1 : @echo off for /f %%i in (host.txt) do (call :sh %%i) goto fin :sh rem test micro connecté ping -n 1 %1 if errorlevel 1 goto :fin shutdown /s /f /m \\%1 :fin echo fin Remarque : host.txt contient la liste des noms IP de machines, une par ligne. 14

SCRIPT 2 : #!/bin/sh FICHIER=resultat MOTS="terre eau air feu" if [ -f $FICHIER ] then echo "Erreur" exit 1 fi for i in *.txt do res=`wc -l $i` echo "$res" >> $FICHIER done echo >> $FICHIER for i in $MOTS do echo "$i" >> $FICHIER grep $i *.txt >> $FICHIER echo >> $FICHIER done 15

ANNEXE Extrait man find find Search a folder hierarchy for filename(s) that meet a desired criteria: Name, Size, File Type - see examples. Syntax find [-H] [-L] [-P] [path...] [expression] GNU find searches the directory tree rooted at each given file name by evaluating the given expression from left to right, according to the rules of precedence (see Operators), until the outcome is known (the left hand side is false for AND operations, true for OR), at which point find moves on to the next file name. Options The '-H', '-L' and '-P' options control the treatment of symbolic links. Command-line arguments following these are taken to be names of files or directories to be examined, up to the first argument that begins with '-', '(', ')', ',', or '!'. That argument and any following arguments are taken to be the expression describing what is to be searched for. If no paths are given, the current directory is used. If no expression is given, the expression '-print' is used (but you should probably consider using '-print0' instead, anyway). This manual page talks about 'options' within the expression list. These options control the behaviour of find but are specified immediately after the last path name. The three 'real' options '-H', '-L' and '-P' must appear before the first path name, if at all. -P Never follow symbolic links. This is the default behaviour. When find examines or prints information a file, and the file is a symbolic link, the information used shall be taken from the properties of the symbolic link itself. -L Follow symbolic links. When find examines or prints information about files, the information used shall be taken from the properties of the file to which the link points, not from the link itself (unless it is a broken symbolic link or find is unable to examine the file to which the link points). Use of this option implies -noleaf. If you later use the -P option, -noleaf will still be in effect. If -L is in effect and finddiscovers a symbolic link to a subdirectory during its search, the subdirectory pointed to by the symbolic link will be searched. When the -L option is in effect, the -type predicate will always match against the type of the file that a symbolic link points to rather than the link itself (unless the symbolic link is broken). Using -L causes the -lname and -ilname predicates always to return false. -H Do not follow symbolic links, except while processing the command line arguments. When find examines or prints information about files, the information used shall be taken from the properties of the symbolic link itself. The only exception to this behaviour is when a file specified on the command line is a symbolic link, and the link can be resolved. For that situation, the information used is taken from whatever the link points to (that is, the link is 16

followed). The information about the link itself is used as a fallback if the file pointed to by the symbolic link cannot be examined. If -H is in effect and one of the paths specified on the command line is a symbolic link to a directory, the contents of that directory will be examined (though of course -maxdepth 0 would prevent this). If more than one of -H, -L and -P is specified, each overrides the others; the last one appearing on the command line takes effect. Since it is the default, the -P option should be considered to be in effect unless either -H or -L is specified. GNU find frequently stats files during the processing of the command line itself, before any searching has begun. These options also affect how those arguments are processed. Specifically, there are a number of tests that compare files listed on the command line against a file we are currently considering. In each case, the file specified on the command line will have been examined and some of its properties will have been saved. If the named file is in fact a symbolic link, and the -P option is in effect (or if neither -H nor -L were specified), the information used for the comparison will be taken from the properties of the symbolic link. Otherwise, it will be taken from the properties of the file the link points to. If find cannot follow the link (for example because it has insufficient privileges or the link points to a nonexistent file) the properties of the link itself will be used. When the -H or -L options are in effect, any symbolic links listed as the argument of -newer will be dereferenced, and the timestamp will be taken from the file to which the symbolic link points. The same consideration applies to -anewer and -cnewer. The -follow option has a similar effect to -L, though it takes effect at the point where it appears (that is, if -L is not used but -follow is, any symbolic links appearing after -follow on the command line will be dereferenced, and those before it will not). Expressions The expression is made up of options (which affect overall operation rather than the processing of a specific file, and always return true), tests (which return a true or false value), and actions (which have side effects and return a true or false value), all separated by operators. -and is assumed where the operator is omitted. If the expression contains no actions other than -prune, -print is performed on all files for which the expression is true. OPTIONS All options always return true. Except for -follow and -daystart, they always take effect, rather than being processed only when their place in the expression is reached. Therefore, for clarity, it is best to place them at the beginning of the expression. A warning is issued if you don't do this. -daystart Measure times (for -amin, -atime, -cmin, -ctime, -mmin, and -mtime) from the beginning of today rather than from 24 hours ago. This option only affects tests which appear later on the command line. -depth Process each directory's contents before the directory itself. -d A synonym for -depth, for compatibility with FreeBSD, NetBSD, MacOS X and OpenBSD. -follow Deprecated; use the -L option instead. Dereference symbolic links. Implies -noleaf. The - follow option affects only those tests which appear after it on the command line. Unless the - 17

H or -L option has been specified, the position of the -follow option changes the behaviour of the -newer predicate; any files listed as the argument of -newer will be dereferenced if they are symbolic links. The same consideration applies to -anewer and -cnewer. Similarly, the - type predicate will always match against the type of the file that a symbolic link points to rather than the link itself. Using -follow causes the -lname and -ilname predicates always to return false. -help, --help Print a summary of the command-line usage of find and exit. -ignore_readdir_race Normally, find will emit an error message when it fails to stat a file. If you give this option and a file is deleted between the time findreads the name of the file from the directory and the time it tries to stat the file, no error message will be issued. This also applies to files or directories whose names are given on the command line. This option takes effect at the time the command line is read, which means that you cannot search one part of the filesystem with this option on and part of it with this option off (if you need to do that, you will need to issue two find commands instead, one with the option and one without it). -maxdepth levels Descend at most levels (a non-negative integer) levels of directories below the command line arguments. '-maxdepth 0' means only apply the tests and actions to the command line arguments. -mindepth levels Do not apply any tests or actions at levels less than levels (a non-negative integer). '- mindepth 1' means process all files except the command line arguments. -mount Don't descend directories on other filesystems. An alternate name for -xdev, for compatibility with some other versions of find. -noignore_readdir_race Turns off the effect of -ignore_readdir_race. -noleaf Do not optimize by assuming that directories contain 2 fewer subdirectories than their hard link count. This option is needed when searching filesystems that do not follow the Unix directory-link convention, such as CD-ROM or MS-DOS filesystems or AFS volume mount points. Each directory on a normal Unix filesystem has at least 2 hard links: its name and its '.' entry. Additionally, its subdirectories (if any) each have a '..' entry linked to that directory. When find is examining a directory, after it has statted 2 fewer subdirectories than the directory's link count, it knows that the rest of the entries in the directory are non-directories ('leaf' files in the directory tree). If only the files' names need to be examined, there is no need to stat them; this gives a significant increase in search speed. -regextype type Changes the regular expression syntax understood by -regex and -iregex tests which occur later on the command line. Currently-implemented types are emacs (this is the default), posix-awk, posix-basic, posix-egrep and posix-extended. -version, --version Print the find version number and exit. -warn, -nowarn Turn warning messages on or off. These warnings apply only to the command line usage, not to any conditions that find might encounter when it searches directories. The default behaviour corresponds to -warn if standard input is a tty, and to -nowarn otherwise. 18

-xdev Don't descend directories on other filesystems. TESTS Numeric arguments can be specified as +n for greater than n, -n for less than n, n for exactly n. -amin n File was last accessed n minutes ago. -anewer file File was last accessed more recently than file was modified. If file is a symbolic link and the -H option or the -L option is in effect, the access time of the file it points to is always used. -atime n File was last accessed n*24 hours ago. When find figures out how many 24-hour periods ago the file was last accessed, any fractional part is ignored: +7 = more than 7 days ago 2 = between 2 and 3 days ago -2 = within the past 2 days +1 = more than 1 day old 1 = between 1 and 2 days ago -1 = within the past 1 day 0 = within the past 1 day A file 47.99 hours old will round down to 1 day, for this to have matched -atime +1, the file would have to have been accessed more than one day ago i.e two days ago or longer. To match a date range you can specify more than one test. -cmin n File's status was last changed n minutes ago. -cnewer file File's status was last changed more recently than file was modified. If file is a symbolic link and the -H option or the -L option is in effect, the status-change time of the file it points to is always used. -ctime n File's status was last changed n*24 hours ago. See the comments for -atime to understand how rounding affects the interpretation of file status change times. -empty File is empty and is either a regular file or a directory. -false Always false. -fstype type File is on a filesystem of type type. The valid filesystem types vary among different versions of Unix; an incomplete list of filesystem types that are accepted on some version of Unix or another is: ufs, 4.2, 4.3, nfs, tmp, mfs, S51K, S52K. You can use -printf with the %F directive to see the types of your filesystems. -gid n File's numeric group ID is n. -group gname File belongs to group gname (numeric group ID allowed). -ilname pattern Like -lname, but the match is case insensitive. If the -L option or the - follow option is in effect, this test returns false unless the symbolic link is broken. 19

-iname pattern Like -name, but the match is case insensitive. For example, the patterns 'fo*' and 'F??' match the file names 'Foo', 'FOO', 'foo', 'foo', etc. In these patterns, unlike filename expansion by the shell, an initial '.' can be matched by '*'. That is, find -name *bar will match the file '.foobar'. Please note that you should quotepatterns as a matter of course, otherwise the shell will expand any wildcard characters in them. -inum n File has inode number n. It is normally easier to use the -samefile test instead. -ipath pattern Behaves in the same way as -iwholename. This option is deprecated, so please do not use it. -iregex pattern Like -regex, but the match is case insensitive. -iwholename pattern Like -wholename, but the match is case insensitive. -links n File has n links. -lname pattern File is a symbolic link whose contents match shell pattern pattern. The metacharacters do not treat '/' or '.' specially. If the -L option or the -follow option is in effect, this test returns false unless the symbolic link is broken. -mmin n File's data was last modified n minutes ago. e.g. find. -mmin +5 -mmin -10 # find files modifed between 5 and 10 minutes ago -mtime n File's data was last modified n*24 hours ago. See the comments for -atime to understand how rounding affects the interpretation of file modification times. -name pattern Base of file name (the path with the leading directories removed) matches shell pattern pattern. The metacharacters ('*', '?', and '[]') match a '.' at the start of the base name (this is a change in findutils-4.2.2; see section STANDARDS CONFORMANCE below). To ignore a directory and the files under it, use -prune; see an example in the description of -wholename. Braces are not recognised as being special, despite the fact that some shells including Bash imbue braces with a special meaning in shell patterns. The filename matching is performed with the use of the fnmatch(3) library function. Don't forget to enclose the pattern in quotes in order to protect it from expansion by the shell. -newer file File was modified more recently than file. If file is a symbolic link and the -H option or the -L option is in effect, the modification time of the file it points to is always used. -nouser No user corresponds to file's numeric user ID. -nogroup No group corresponds to file's numeric group ID. -path pattern See -wholename. The predicate -path is also supported by HP-UX find. -perm mode File's permission bits are exactly mode (octal or symbolic). Since an exact match is required, if you want to use this form for symbolic modes, you may have to specify a rather complex mode string. For example '-perm g=w' will only match files which have mode 0020 (that is, ones for which group write permission is the only permission set). It is more likely that you will want to use the '/' or '-' forms, for example '-perm -g=w', which matches any file with group write permission. See the EXAMPLES section for some illustrative examples. -perm -mode All of the permission bits mode are set for the file. Symbolic modes are accepted in this form, 20

and this is usually the way in which would want to use them. You must specify 'u', 'g' or 'o' if you use a symbolic mode. See the EXAMPLES section for some illustrative examples. -perm /mode Any of the permission bits mode are set for the file. Symbolic modes are accepted in this form. You must specify 'u', 'g' or 'o' if you use a symbolic mode. See the EXAMPLES section for some illustrative examples. If no permission bits in mode are set, this test currently matches no files. However, it will soon be changed to match any file (the idea is to be more consistent with the behaviour of perm -000). -perm +mode Deprecated, old way of searching for files with any of the permission bits in mode set. You should use -perm /mode instead. Trying to use the '+' syntax with symbolic modes will yield surprising results. For example, '+u+x' is a valid symbolic mode (equivalent to +u,+x, i.e. 0111) and will therefore not be evaluated as -perm +mode but instead as the exact mode specifier -perm mode and so it matches files with exact permissions 0111 instead of files with any execute bit set. If you found this paragraph confusing, you're not alone - just use - perm /mode. This form of the -perm test is deprecated because the POSIX specification requires the interpretation of a leading '+' as being part of a symbolic mode, and so we switched to using '/' instead. -regex pattern File name matches regular expression pattern. This is a match on the whole path, not a search. For example, to match a file named './fubar3', you can use the regular expression '.*bar.' or '.*b.*3', but not 'f.*r3'. The regular expressions understood by find are by default Emacs Regular Expressions, but this can be changed with the -regextype option. -samefile name File refers to the same inode as name. When -L is in effect, this can include symbolic links. -size n[cwbkmg] File uses n units of space. The following suffixes can be used: 'b' for 512-byte blocks (this is the default if no suffix is used) 'c' for bytes 'w' for two-byte words 'k' for Kilobytes (units of 1024 bytes) 'M' for Megabytes (units of 1048576 bytes) 'G' for Gigabytes (units of 1073741824 bytes) The size does not count indirect blocks, but it does count blocks in sparse files that are not actually allocated. Bear in mind that the '%k' and '%b' format specifiers of -printf handle sparse files differently. The 'b' suffix always denotes 512-byte blocks and never 1 Kilobyte blocks, which is different to the behaviour of -ls. -true Always true. -type c File is of type c: b block (buffered) special c character (unbuffered) special d directory p named pipe (FIFO) f regular file 21

l symbolic link; this is never true if the -L option or the -follow option is in effect, unless the symbolic link is broken. If you want to search for symbolic links when -L is in effect, use - xtype. s socket D door (Solaris) -uid n File's numeric user ID is n. -used n File was last accessed n days after its status was last changed. -user uname File is owned by user uname (numeric user ID allowed). -wholename pattern File name matches shell pattern pattern. The metacharacters do not treat '/' or '.' specially; so, for example, find. -wholename './sr*sc' will print an entry for a directory called './src/misc' (if one exists). To ignore a whole directory tree, use -prune rather than checking every file in the tree. For example, to skip the directory 'src/emacs' and all files and directories under it, and print the names of the other files found, do something like this: find. -wholename './src/emacs' -prune -o -print -xtype c The same as -type unless the file is a symbolic link. For symbolic links: if the -H or -P option was specified, true if the file is a link to a file of type c; if the -L option has been given, true if c is 'l'. In other words, for symbolic links, -xtype checks the type of the file that -type does not check. -context pattern (SELinux only) Security context of the file matches glob pattern. ACTIONS Use operators to separate multiple actions. If the operator is omitted, -and is assumed. The default action is to -print all files for which the expression is true. -delete Delete files; true if removal succeeded. If the removal failed, an error message is issued. Use of this action automatically turns on the '-depth' option. -exec command ; Execute command; true if 0 status is returned. All following arguments to find are taken to be arguments to the command until an argument consisting of ';' is encountered. The string '{}' is replaced by the current file name being processed everywhere it occurs in the arguments to the command, not just in arguments where it is alone, as in some versions of find. Both of these constructions might need to be escaped (with a '\') or quoted to protect them from expansion by the shell. See the EXAMPLES section for examples of the use of the '-exec' option. The specified command is run once for each matched file. The command is executed in the starting directory. There are unavoidable security problems surrounding use of the - exec option; you should use the -execdir option instead. -exec command {} + This variant of the -exec option runs the specified command on the selected files, but the command line is built by appending each selected file name at the end; the total number of invocations of the command will be much less than the number of matched files. The command line is built in much the same way that xargs builds its command lines. Only one 22

instance of '{}' is allowed within the command. The command is executed in the starting directory. -execdir command ; -execdir command {} + Like -exec, but the specified command is run from the subdirectory containing the matched file, which is not normally the directory in which you started find. This a much more secure method for invoking commands, as it avoids race conditions during resolution of the paths to the matched files. As with the -exec option, the '+' form of -execdir will build a command line to process more than one matched file, but any given invocation of command will only list files that exist in the same subdirectory. If you use this option, you must ensure that your $PATH environment variable does not reference the current directory; otherwise, an attacker can run any commands they like by leaving an appropriately-named file in a directory in which you will run -execdir. -fls file True; like -ls but write to file like -fprint. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled. -fprint file True; print the full file name into file file. If file does not exist when find is run, it is created; if it does exist, it is truncated. The file names ''/dev/stdout'' and ''/dev/stderr'' are handled specially; they refer to the standard output and standard error output, respectively. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled. -fprint0 file True; like -print0 but write to file like -fprint. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled. -fprintf file format True; like -printf but write to file like -fprint. The output file is always created, even if the predicate is never matched. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled. -ok command ; Like -exec but ask the user first (on the standard input); if the response does not start with 'y' or 'Y', do not run the command, and return false. If the command is run, its standard input is redirected from /dev/null. -print True; print the full file name on the standard output, followed by a newline. If you are piping the output of find into another program and there is the faintest possibility that the files which you are searching for might contain a newline, then you should seriously consider using the '- print0' option instead of '-print'. See the UNUSUAL FILENAMES section for information about how unusual characters in filenames are handled. -okdir command ; Like -execdir but ask the user first (on the standard input); if the response does not start with 'y' or 'Y', do not run the command, and return false. If the command is run, its standard input is redirected from /dev/null. 23