ftp Server in Linux - RHCE - Tech Arkit
#RHCE #Linux #Tutorial
Youtube PlayLists
RHCE: https://goo.gl/LGTmDK
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda | https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark | https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark | https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit | https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark | https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark | https://goo.gl/79zwX9
MySQL Replace Maria DB Installation In Linux - Tech Arkit
#RHCE #Linux #Tutorial
Youtube PlayLists
RHCE: https://goo.gl/LGTmDK
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda | https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark | https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark | https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit | https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark | https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark | https://goo.gl/79zwX9
SSL Certificate for Free - Tech Arkit
openssl req -new \ certificate.csr
openssl rsa -in privkey.pem -out keyfile.key
openssl x509 -in certificate.csr -out cert.cert -req -signkey keyfile.key -days 365
cp cert.cert /etc/ssl/certs/server.crt
cp keyfile.key /etc/ssl/private/server.key
mkdir -p /etc/pki/tls/private/
mkdir -p /etc/pki/tls/certs/
sudo cp cert.cert /etc/pki/tls/certs/cert.crt
sudo cp keyfile.key /etc/pki/tls/private/server.key
cd /etc/httpd/conf.d/
vim ssl.conf
\VirtualHost *:443\
ServerAdmin root@localhost
ServerName TechArkit-Server.local
DocumentRoot /var/www/html
SSLEngine on
SSLProtocol all -SSLv2 -SSLv3
SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5
SSLHonorCipherOrder on
SSLCertificateFile /etc/pki/tls/certs/arkit.com.crt
SSLCertificateKeyFile /etc/pki/tls/private/arkit.com.key
#SSLCertificateChainFile /etc/pki/tls/certs/arkit.com.csr
\/VirtualHost\
systemctl restart httpd
httpd -t
vi /etc/hosts
192.168.2.43 TechArkit-Server.local
httpd -t
IPv6 Address Assigning to Linux Interface RHCE - Tech Arkit
Youtube PlayLists
RHCE: https://goo.gl/LGTmDK
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda | https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark | https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark | https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit | https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark | https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark | https://goo.gl/79zwX9
Network Teaming Configuration in RHEL7 - RHCE - Tech Arkit
Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems. Red Hat Certified Engineer Course. EX300 examination preparation guide.
https://arkit.co.in/rhel7-how-to-configure-nic-teaming/
nmcli connection show
nmcli connection add type team con-name team0 ifname team0 config '{"runner":{"name": "activebackup"}}'
nmcli connection modify team0 ipv4.addresses 192.168.2.156/24 ipv4.gateway 192.168.2.2 ipv4.dns 192.168.2.2 connection.autoconnect yes ipv4.method manual
nmcli connection add type team-slave con-name team0-port0 ifname ens37 master team0
nmcli connection add type team-slave con-name team0-port1 ifname ens38 master team0
nmcli connection show
ip addr
#RHCE #Linux_Tutorial #Certification #Video_Guide
RHCE: Red Hat Certified Engineer Course Overview
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
Red Hat Certified System Administrator - RHCSA
PDF Book RHCSA: https://github.com/techtutorials/Linux-For-Beginners
Play List: https://www.youtube.com/watch?v=BskRmjvWG5Y&list=PL8cE5Nxf6M6Y0lBYoJiIbGI-XbQueICqK
RHCSA Content: https://arkit.co.in/one-linux-tutorial/
https://arkit.co.in/rhel7-rhcsa-exam-objectives-for-beginners/
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/pdf/system_administrators_guide/Red_Hat_Enterprise_Linux-7-System_Administrators_Guide-en-US.pdf
Firewall configuration RHEL7 - Tech Arkit
Hi friends welcome to Tech ArkIT YouTube channel my name is Ravi in this video session we are going to see how to create Firewall rules are how a Firewall works in Linux.
let's see that so basically most of the times the firewall-cmd we can use command line to create the rules but here which I am going to show you a easy way that you can also use the graphical mode make this a Firewall rules so easy how you can use that
let's see if you want to open a Firewall graphical mode you can also go to Terminal and type firewall-cmd sorry firewall-config it opens a firewall configuration Windows here so from here you can make this configuration changes
you can also open you can also open application from the application if you go to this sundry and say Firewall and this is also open the similar way here we are going to see that the graphical window how it's going to work ok
this is exactly a graphical window here in this firewall-cmd actually there are two configuration one is a runtime configuration next one is an a permanent configuration we're going to see that this is runtime configuration and this is permanent configuration
if you make runtime configuration run time configuration in the sense whenever your machine is on you make the same configuration it affect your rules then whenever you reboot your machine without you reboot your Linux machine the whatever the rules you made its go off but whenever you make on the permanent rule if you restart your machine also is does not go away that's the difference between time configuration and permanent configuration
we're going to see over here and you can see this the connections whatever you have how many connections you have make your connection which connection you would like to make the changes you can also use any Ethernet port ok I can use these zones
you can make multiple zones because this multiple zones can help you out because example say you have in office you can make some office zone over here and right certain and rules
then you go to the public place you make certain rules and you activate the public zone are you can go to home are you can make some related configuration changes on this zone are there rules on this zone then that can affect whenever you activate that zone
like this you can do a number of zones and activate them whenever you need based on your network connectivity are based on your things what you want to activate her what you don't wanted to activate you can use this to activate or not to activate
let over here I am just making the configuration changes over here on the permanent basis on the system again just change the configuration to permanent and I am going to change this zones and I am going to change this configuration in to the public zone
here these are the services what are the service is currently it enabled on the firewall Let's see this IPv6 client http https ssh this are the by default are enabled or I have enabled http and https for making the http web server communication or if you want to enable anything you can just say that tick mark it examples I want to tenable FTP just tick mark it and examples I wanted to enable NFS and ntp something like this that's it
it enabled now you can go to this ports there is no ports are currently enabled if you enable the services also by default enables the ports but you don't need to remember the ports whenever the services are there but which are non standard ports examples that's the standard ports example ssh is 22 but if you do not have any non standard services are non standard ports enable then you have to manually enable over here example same here
I just wanted to specify something like this 18634 and this is a TCP port just I would like to enable over here this port is enable now if you want to enable any protocol level settings I can use this any protocol over here TCP udp icmp if you want to block it or if you want to enable it you can do all this stuff over here
source ports which are the additional sports examples in at the range in Port can accessible we can do from this machine you can add it range of ports example say that I would like to say 1024 to 60004 I don't want to use it or I can enable it like this that all the ports of range of ports will be enabled in the single go like this you can do that
masquarding in the sense this is not just a it's a Linux service or I can say simply say that it's just like NAT settings network address translation settings like you do on the network side in similar way you can do this IP masquerdo go over here if you want to make masquido zones you can make it over here are forwarding this is zone from one IP address to another IP address you can
NAT examples say that none of the machine have some public IP address but that IP address whenever you get the request for their it lands to the other private IP address and which communicate with the public IP address but the end user not only the public IP address but internal redirects to the different IP address that's called Masquerding
we can just use this rules as well but I'm not going to use any Masquerding rules over here
this is called port forwarding port forwarding sometimes very very secure or if you wanted to use this port forwarding method safe and example I am just saying that I am forwarding some of the logs to one of the machine which listens and actually 514 but internally i have another service which is listening on maybe in a non-standard port or maybe different port maybe 9004 or 8004 something like that if you want to forward those logs to this connection you can make use of this forwarding
maybe can say that I'm my standard I don't want to use any standard ports to be communicate on the external face I just wanted to change them to the internally with the service changes can use this port forwarding so that what happens when ever somebody is trying to access your machine with the standard ports they cannot access because it's going to be changed into the different port and the port listening on a different port of Port settings
that's what you can do over here example say that I am just using the source protocol TCP here I am just forwarding 1024 port number 1024 to the destination local forwarding and just using forward to another port maybe can use these different IP address as well maybe I wanted to send this forwarding to the different machine you can also to that this local forwarding Global forwarding in the sense within the local Machine
it's forwarding that 1024 port number to the 2048 port number like this you can use a port rule which can forward this port to this port whenever is your traffic is getting to the 1024 and it's going to be forward to the 2048 this is a port forwarding rule if you want to remove it if you just simply using select and remove it
icmp filters icmp filters are very very useful sometimes its are way if you set one example say i ping to the machine the machine is pinging which means that ok I know that the machine is up and running
but sometimes if you disable this icmp echo or echo request say that when I ping from the remote machine says that I could not able to ping this machine because whenever any icmp packet is getting into this machine say that drop it
that's fine you can make this sometime useful sometimes not because if you say echo request you are going to deny say that some if I ping this machine is going to be not respond to the ping because ICMP filter i put is that do not respond to the any icmp request the remote user may say that the machine is down or the server is down
I am not able to make ping to the admachine you can make based on user security reasons are security measures what you would like to do over here and rich ruls you can write the rich rules to allow ports are the allow a IP address like examples of that I would like to say I don't want to make all each and every IP address to be listed here instead of that we can make enter subnet address over here something like protocol forwarding port forwarding something like that you can do over here
see this you can select any version of over here examples select ipv4 and element with server port or whatever you would like to do a over here example say that port and what you want like write over here which port range I don't want to specify any port range over here maybe some random port
I just selected over here this one what is the action you would like to say you were here and I would like to forward this one are you like to whatever it is or if you want to specify setup IP addresses on here you can set up that IP address is over here if you want to maybe if you want on the Mac address you can add the MAC address to filter if you want to use IP range you can also use this IP range followed by the Subnet Mask ok
and where you wanted to forward or where you wanted to do this port setting forwards you can also use this iP range of IP address all this stuff
this is how we can write the rich rules on the graphical mode you have to understand before what you are making the connections or what you are making the rich rule is all about then make the connection first of all right into the paper and with what you are going to
do over here then make that rich rule
this is the interfaces examples of that if you have multiple interface names if you would like to add into this public zone you can also add interfaces over here but by default I have only one NIC card I have only one interface over here I am not adding any other because I do not have any other to add
sources these are the sources if you like to add or here based on the Mac address IP addresses binding source addresses of information you can add over here MAC Address Ip Address over again and this is how the zones can be
You can see that services directly can allow based on this services if you want to add some standard service he have example say that I have some my naming service name called any application I made it example say that arkit is my service name example specify that my version name is 4 OK short name is nothing description is nothing you can simply Add over here
this port number this service is going to be added over here you can we find that what is the port number example the service is going to be listen on whenever you are adding the rule on the firewall you no need to specify the port number manually you can simply add this --service then provide service name that's it this automatically the service rule is going to be added into the firewall
these are the IPsets you would like to specify the IPsets like example say that this is my certain zone I have this IP range are based on the location based on the work zones you can specify the IP set here this all the configuration we can do from here on the graphical user interface it's very very simple then after that what I have to do is that you have to reload this Firewall settings that is going to be committed changes ok
I have to do this reload this Firewall D then what happened the all the rules what what are the configuration as of now you did it it's going to be effect over here if you do not do reload what happened just going to be not effective no I'm not effective ok
are you can also make the if you made some runtime goes if you like to convert them to the permanent and you can also use these are some time to permanent is going to be to your rules as permanently from the runtime to permanent
that's all you can do the firewall settings are firewall configuration using this GUI tool here
if you would like to make the same related settings you can also use this firewall-cmd is the command which can help you out in making the rules there are many The Other fights audio in the graphical user mode can you make use of the firewall-cmd to make this,nd line only,nd line new stage survival CMD,nd if I would like to make some changes or if I would like to make any Firewall related the rules then you can use this first of all I am going to verify that the firewall status systemctl status Firewall dealer service if the services running you can make any rules if this service is not running you cannot use firewall-cmd which do not affect any configuration changes on equality just I am going to make some firewall-cmd -get default zone I say that what is my currently default zone is anytime you can set one's own as your default is on that what I say that you can make multiple choice but you can activate only one June as your default zone whatever the rules Euro 10 on that particular job will be affected whenever you activate that's all ok simply you can do that firewall-cmd --set default zone equal to whatever zoney would like to whatever the joy you have created that you can make it as default examples I am just making again the public as my default is already there that's why it says that there's always already said to the default now you can see that what is steam I currently active zones get active job there is always one zone that is going to be I can see that are firewall-cmd --version which version currently I'm using at 0.4.4 if would like to a list of the interfaces which I cannot be added into your public zone you can simply use a firewall-cmd --zone which one I would like to use this zone what are the interfaces are there examples with at least interfaces this interface is currently added into the publisher examples if you have different zone you can use that althere is no interfaces handed it to the home zone if you like to add you can aladd using this firewall-cmd command over here --interface equal to Interface name example say that 880 example --zone equal to sorry is equal to home that this is going to add interface 8802 the zone called home firewall-cmd --remove -interface equal to its 08181 equal to how if you want to remove that interface from the zone you can use this,nd to or if you would like to see that how many services are currently there on this Firewall you can use firewall-cmd --services ola services each other name be there on this Firewall it will be listed all over here like this you can add things are remove the things are you can do a rich rules are if you want to import bulk settings or bulk changes to this Firewall you can use this XML file where it is located on the etc ok can match 80c Firewall D and here on this zones exam today that this is called public XML file currently we have made the changes on using the graphical exam model right I guess you can make this XML file and add services and boards settings all the stuff you can load that there's a XML file and reload this Firewall settings that in the single go you can make fire all changes like this you can use your Firewall there are many stuff you can do that example I am going to show you were here is that I am going to make some permanent port forwarding rule from the using The firewall-cmd how we can make that firewall-cmd --permanent I have Network and forward code equal to 4 number which port number if you like to add here ok the port number examples I would like to forward 443 and you can use the: ok and protocol which protocol you would like to use my protocol is TCP and to which port you would like to forward to port and I would like to forward this port to the something like 8080 whenever you are getting the traffic or whenever you are getting the request from port 443 that's going to be transferred to the destination port is 8080 this is the role you can make and ok here we have to add the protocol whenever you add port number that is what this is what the role we have to and there are some this is the photos we have to add ok it's already there and you can have to use firewall-cmd --reload that whatever changes you made it's going to be effective that's about Firewall guys thanks for watching the tune please subscribe the channel for more upcoming videos and courses
RHEL7 Systemctl Explained - RHCSA - Tech Arkit
so how that system in it can be shown on how the system unit can be specified so basically the systemctl command the syntax is over here so here systemctl is the command you have to specify and hear what is the action you would like to do Sudarshan vision sensor you want to do a status on I want to do a restart are you wanted to Airoli Lodha you want just wanted to see the related stuff on the service all this stuff and here you can specify that whatever the name the service name ok and its unique name so any so like this service name its unique name the unit name can be service that surveys are socket or device name or mount name and automount name of name target or path timer a slice a scope there are a number of units files are there in that which you wanted to start example is that you wanted to start only the service then service name that unit name is service start some sockets on that service the service socket name on that service name.net socket you have to be fine so the unit name can be a service socket device mount phone swap target Parth timer please find hope so these are the unit available on the systemctl service so whatever the name you would like to most of the situations we use a bad service most of the situation to use that service or date mornings something like that but these are the you can use to be on this systemctl unit names you can use anything what is your requirement upon so for Service Management task the target unit will be service unit which have unit files with a suffix the services that service or don't forget that device or whatever it is however foremost Service Management commands you can actually leave of the dark service suffix which means that so you can simply leave that service for most of the services you wanted to restart or check the status are you wanted to show them the details about that service which process is using all the related stuff you can do that so let let go ahead and see some examples over here this I would like to see that and status of network service this is the exact the state of output will be in the status of full of put it gives a detailed information that is the service is running successfully are not ok the service is whether it is enabled which means that while restarting your system whether it is enabled or not ok which process ID it is exactly using and which exactly the path of that service file where it is located the script to start that service and what is this listening on and all the details about that can be given on this service status which means that the systemctl status on this any service if you take example for the systemctl status I would like to see that sshd status so the sea for everything which means that which is the dominant is used and which exactly name the path the file path is going to be load over here and whether it is unable to start on the whenever you restart with that it is unable to start on the startup process or not if it is enabled which means that your service is unable to start on the startup reboot the machine ok so this is the demon names related dogs if you can if you want to find some related documentation about that ssh related you can use these commands to do a some documentation stuff over here and which PID currently which is using and which Shield processor CG groups OK then which actually the complete unit is make it into the groove so one service can be done in to the multiple group related information of here so it will give you the all the details like which is running and what is the status of it which port is used listening on Ok that it is accepting all the socket numbers are not all the details it will give you are there I like to say that the systemctl sure ok I can see that internet service over here so I can give you the all the related information about that what it's doing series so what is actually doing audit this configuration and all the stuff it can give you example say that ssh data service which may be serious so what are those all this information is going to be give you in detail information that which is enabled or which is not enabled on which is ok everything will b is going to be give you so if you would like to verify that you're single line that whether the service is active or inactive or whether it is enabled or not enabled you can simply type that systemctl is active and provide the service name say that ok the service is active start on startup you can say that is it enabled essay enabled so like that you can verify any other services if you would like to get the status over here like this so whether it is active maybe can get the different outputs like it is master is is the storm or not stop activated not activated ok those are the information will get on the active status information so if you like to enable any service to start on startup can simply use that systemctl enable and service name the unit name service just I would like to say that table yes it is enabled if you like to restart maybe so if you like to restart these services you can simply simply say that restart over here the service will be restarted but you will not get any output over here you have to verify the status so that it will give the detail information about that whether service is restarted properly or not when it is started so all the details origin reload example say that what the difference between the we start and the reloads for the reloading the since its effect these services changes whatever changes you have changed on that service will be affected but the existing PID will never change if you reload the service so similar way you can see that the PID is 2563 if I would like to reload the sun systemctl service reload over here say kondai dot if you go and verify the status again serious 2563 is the same Id before and now that's what happens when the restart and reload is the differentiation there sorry road in the sense what is the configuration changes without interrupting the service you can apply to the service but if you restart it get interrupted and its PID get Delete completely what are the services what are the existing PID will be killed off and it will be start the new PID for verify that what are the dependency taken simply see that systemctl list dependencies dependencies and provide the name which would like to verify your here you that what are the how many dependencies are there for that series dependencies are there over here so like this you can verify the dependencies and you can verify the system units as well list so these are all the units which is going to be activated are the active currently running all this information on here this many units are currently this is done so there are more than that actually see this there are device anytime there are some different units were here to this most of the in HR Services and you can also see some mounts and can also see some part ok maybe can also see some different series swap and targets rocket also I can see you were here Tera different Unit II simplicity that ok these are the status you can also see that what is mean by the lord and active and serve all this information you can see your here so I should like to see that I'm unit files example that list all the unit files which are currently running or not running in abled not enabled all the information can be shown over here you can see this RP if you can also be filtered further if you like to show only be enabled and disabled want something like that you can also be filtered over here ok maybe the filter can be applied for the baby can also use some great if would like to see only the enabled services over here I can see that this many services not enabled which is going to be very very easy to identify the surface status and you can do that but here in the systemctl you can also set a default target different organisations which would you like to boot example say that I would like to boot into the in multi user target are the the emergency mode or what are the more you would like to MOD examples SCL I are they are what are these thus you wanted to say it you can do that as well examples 8 systemctl get default examples that what is the default target currently have so this is the target currently I have issue like to set a different term target you can also use systemctl and set default say that multi user data get this I would like to set this multi user that target so that whenever I reboot the machine it's going to be a NaCl I mode would like to change this back again to the graphical user mode you can use that graphical so that you can get this so this is how we can change your set default so these are the target she have currently so you can set any in a number of any number of can get to vote your system into the target so suddenly I am using American video currently I am using this graph graphic card at target so that whenever my system is booted it's going to be a run into the graphical mode you can see this this is the graphical mode if a set into the multi user mode it's going to be a RC airplane mode ok so whatever you wanted to say to cancel it but most of the uses a selfie Mania are used to see that the graphical mode so that the basics users can also be happy that whenever you this is a jio instead of CL I so that's what I can say that up buddy fall into the graphical mode that would be a m and great her that would be a useful for you to setup so but here in systemctl they have the different concept called am asking what is mean by the masking the services masking the services in the sense whenever you say that you stop the service are you disable the service the other user can other user can able to enable the service and start the service but if you must the service enable are they cannot start the Service until unless they are not the service so it is over here exam for say that systemctl I just I would like to disable kondadi service over here so that's going to be disabled and I'm going to verify that I'm system is cronbach Kisi that the system is going to be the contact the is disabled so I would like to say that it's going to be start so I stop the service and then just going to see the systemctl status from that data service with says that which is inactive and died which is disabled mode so shall I can see that some of the schedule for the sum of the commands are still trying to stop its related services ok if you would like to mask the service now so now what you can do that if you would like to start the service just see this status over here so which is smart Jism ask if would like to start the service and try or hear what happens servcice fail to start Kondotty Unity smart whenever you marked it so nobody can start the service are unable to service your they cannot do anything until unless they unmask this unmask now you can start the service you can see that is status Kisi that it is running and active like that you can verify you can mark the service whenever you don't need the service or you don't wanted to stop Whenever the service system is restarted are you can tell the other administrators of the other users that do not start the Service until unless they have be continuous requirement and that service to start so this is you can do to the all the services which are not required or which you don't wanted to start the service so that makes a lot of resources savings savings of your hardware resources are its can also be save your system from the unauthorised access using the services are security compromisation all this so that will enable you to make more secure of your system so this is about the systemctl guys you can also use the system CPL command to power off your machine reboot your machine ok even you can do this all to your system so this is how you can do that examples that I would like to reboot this machine so can do that simply a system is going to be rebooted are you can also for of using this systemctl command something like that make use of systemctl so that will be perfect timed use this our future in future so all the best of you thanks for watching stay tune please subscribe the Tech Arkit channel for more upcoming videos and courses
RHEL7 Gain Acces To root User interrupting boot process - Tech Arkit
hi friends welcome to Tech Arkit YouTube channel my name is Ravi. In this video session we are going to see that how to interrupt boot process and get the access to the any Linux machine, whenever you have a physical access to the server.
Let's see this so how you can do that. so first of all here I have the Linux machine switched-on. So i have a physical access to this machine when I click over here so I say that enter and I type the password over here but unfortunately the password is wrong. So I would like to reset this password or I would like to gain the access to the machine. I do not have the password in hand let's do that how you can get it.
so first of all I am going to reboot this machine, click restart, while machine has been restarting so I have to press spacebar to stop over here.
The kernel process stopped over here. here in the kennel step it self what you can do is that so I can simply click are you sick and simply Say e for edit which means that I'm going to edit this kernel lines to interrupt the boot process.
I just edited using the e and go down over here and whereever you see that Linux16 the line ok simply go to the end of that line and add rd.break console equal to tty1 so whenever you add this one what happens so whenever you add this one it says that you are entering your breaking this process and entering into the single user mode.
by entering into the single user mode you get the access to the that machine so which means that you are in the single user mode It does not ask you any username and password just enter into the root directly ok.
so now just press control x now the machine boot process would be interrupted and enter into the single user mode ok now which got into the single user mode directly can see that hash value over here to you which means that which is into root.
type Mount command and see that all this files has been mounted as read only actually. so not mounts really into the rewrite options for here OK.
are else you can also see the mount /sysroot over here already mounted and it is busy looks like ok so maybe you can grep /sysroot ok the root file system has been mounted but which shows here it is that /sysroot is in read only so whenever you have read only file system you cannot edit anything.
it should be read write then only I can write anything on this file system. inorder to gain inorder to convert this into read/write just do this month -o remount,rw /sysroot and read/write this partition re-mount this mount point. With read write access /sysroot
now you can see that using the above command now it is rewrite. just convert this /sysroot into actual root using the convert chroot innocent change chroot /sysroot now it becomes an root now type command called passwd which will ask you for the new password to enter the can now change the password over here so the password authentication has been changed.
now you can rebot the machine but what happened here is that the by default RHEL7 enables the SELinux so without relabling all your selinux policy are the contexts then you can not get the access really to the machine so in order to gain the success and reliable all selinux related stuff then what have to do is that you have to create empty file in the / (slash) so that it relabels automatically so in order to do that create touch / dat auto relabel so be careful because if you mispell or if you do not properly create this file you cannot get the access are you cannot gain access to the machine.
so in order to do that you have to be very careful whenever you are creating this file so confirm that the file has been created and exit from the process whenever you do exit 2 times it reboots the machine it relabels everything from the the contexts of the selinux then it starts the machine then you can enter into the username and password so that you will get the access.
so now your PC has been turned on we can go to the user and type the password so actually reset the password called root user over here and enter the password. that's it you got into the machine see this your machine now you are into root user
that's it so you simply gain this access by interrupting your kernel process whenever you have the physical access to that machine
thanks for watching stay tune please subscribe the channel for more upcoming videos and courses
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
RHEL7 Boot Process Step by Step Explained - Tech Arkit
RHEL7 - RHCSA Red Hat Certified System Administrator the first certification for beginners to earn.
A. Understand and use essential tools
1. Access a shell prompt and issue commands with correct syntax
2. Use input-output redirection (>, >>, |, 2>, etc.)
3. Use grep and regular expressions to analyze text
4. Access remote systems using ssh
5. Log in and switch users in multiuser targets
6. Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
7. Create and edit text files
8. Create, delete, copy, and move files and directories
9. Create hard and soft links
10. List, set, and change standard ugo/rwx permissions
11. Locate, read, and use system documentation including man, info, and files in /usr/share/doc
B. Operate running systems
12. Boot, reboot, and shut down a system normally
13. Boot systems into different targets manually
14. Interrupt the boot process in order to gain access to a system
15. Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
16. Locate and interpret system log files and journals
17. Access a virtual machine's console
18. Start and stop virtual machines
19. Start, stop, and check the status of network services
20. Securely transfer files between systems
C. Configure local storage
21. List, create, delete partitions on MBR and GPT disks
22. Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
23. Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
24. Add new partitions and logical volumes, and swap to a system non-destructively
D. Create and configure file systems
25. Create, mount, unmount, and use vfat, ext4, and xfs file systems
26. Mount and unmount CIFS and NFS network file systems
27. Extend existing logical volumes
28. Create and configure set-GID directories for collaboration
29. Create and manage Access Control Lists (ACLs)
30. Diagnose and correct file permission problems
E. Deploy, configure, and maintain systems
31. Configure networking and hostname resolution statically or dynamically
32. Schedule tasks using at and cron
33. Start and stop services and configure services to start automatically at boot
34. Configure systems to boot into a specific target automatically
35. Install Red Hat Enterprise Linux systems as virtual guests
36. Configure systems to launch virtual machines at boot
37. Configure network services to start automatically at boot
38. Configure a system to use time services
40. Install and update software packages from Red Hat Network, a remote repository, or from the local file system
41. Update the kernel package appropriately to ensure a bootable system
42. Modify the system bootloader
F. Manage users and groups
43. Create, delete, and modify local user accounts
44. Change passwords and adjust password aging for local user accounts
45. Create, delete, and modify local groups and group memberships
46. Configure a system to use an existing authentication service for user and group information
G. Manage security
47. Configure firewall settings using firewall-config, firewall-cmd, or iptables
48. Configure key-based authentication for SSH
49. Set enforcing and permissive modes for SELinux
50. List and identify SELinux file and process context
51. Restore default file contexts
52. Use boolean settings to modify system SELinux settings
53. Diagnose and address routine SELinux policy violations
Edit configuration files faster ever using vi and vim RHCSA
______________________
Text Editores
______________________
Syntax: vi <FileName>
#vi FileName
Insert Mode: You can able to Insert/Write the Data to the Text file.
Command Mode: You can able to copy the text/Delete the text Paste.
EX-Mode: Execute commands, Write/Exit
-------------------------
Command Mode shortcut
-------------------------
command mode is default mode to execute text manupalation commands
dd = Delete Line
d5d - will delete 5 lines
5dd - will delete lines
x = Delete Character
nx - delete n characters (Ex. 6x deletes SIX characters)
yy = copy line
y6y - it will copy SIX lines to below
6yy - it will copy SIX lines to below
p = Paste copied lines below the cursor
P = Paste copied line above the cursor
dw = delete single word
u - undo the last action
J - join the line
. - redo
U - undo all changes to the current Line
w - will move to the begining of the next word
nw - will move to nth word begning
b - will move begining of the previous word
nb - will move begining of nth previous words
{ - move backword one paragraph
} - move forward one paragraph
0 - will go to home position
$ - will go to end of the line position
h <-- using h key we can go from right to left direction
l --> using l key we can go from left to right direction
k ^ using k key we can go UP from down
j -- Using j key we can go Down from UP
Shift +G == go to Last line of the file
Shift+h == go to first line of screen
Shift+z == Save & Quit
n = Search Strings from top to bottom
N = Search from bottom to top
%s/Old/New == Replace content from old to new
/StringName == Search Particular Word in the file.
-----------------
Insert Mode
-----------------
i = Insert Data before the cursor position
I = Insert content starting of the Line
a = It will append current Line characters
A = It will append the characters from end of the Line
o = It will insert a new line below the cursor
O = It will insert a new line above the cursor
s = substitute the stream
r = replace the current character
'home' key to go home of the line
'end' key to go end of the line
------------------
Ex-Mode Shortcut
------------------
Esc key to change the mode to Execute mode
:q = Quit file
:w = write file
:wq = Save& quit.
:q! = quit forcefully
:wq! = Save & Exit forcefully
:1 == go to first line of the File
:set nu == Set the line numbers
:set nonu == Remove Line numbers
:<spesify line number> == Specified Line number.
:r /root/test = copy the content of test file in cursor current position
:r !date = the command output will paste in current cursor position
____________________________
nano Text Editor
____________________________
CTRL+g Or F1 = Help
CTRL+x Or F2 = Save File
CTRL+o Or F3 = Write to file to disk
CTRL+j Or F4 = To justify
CTRL+r Or F5 = To insert file text to cursor current position
CTRL+w Or F6 = Search for string
CTRL+y Or F7 = Move to previous screen
CTRL+v Or F8 = Move to the Next Screen
CTRL+k Or F9 = Cut the current and keep into buffer
CTRL+v Or F10 = Uncut/Paste into current file
CTRL+c Or F11 = Display the position of the cursor
CTRL+SHIFT+G = Go to mentioned Line
Network Settings Using GUI RHEL 7 - RHCSA - Tech Arkit
https://youtu.be/qx0B9_KoxWM
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
nmtui Text Based User Interface RHEL 7 - RHCSA - Tech Arkit
nmtui - NetworkManager-tui Text User Interface for controlling NetworkManager
rpm -qa |grep NetworkManager-tui
nmtui edit connection_name
nmtui connect connection_name
nmtui-edit | nmtui edit {name | id}
nmtui-connect | nmtui connect {name | uuid | device | SSID}
nmtui-hostname | nmtui hostname
nmtui is a curses based TUI application for interacting with NetworkManager.When starting nmtui, the user is prompted to choose the activity to perform unless it was specified as the first argument.
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
nmcli command-line tool for controlling NetworkManager - RHEL 7 - RHCSA
nmcli is a command-line tool for controlling NetworkManager and reporting network status. It can be utilized as a replacement for nm-applet or other graphical clients. nmcli is used to create, display, edit, delete, activate, and deactivate network connections, as well as control and display network device status.
Scripts: Utilize NetworkManager via nmcli instead of managing network connections manually. nmcli supports a terse output format which is better suited for script processing. Note that NetworkManager can also execute scripts, called "dispatcher scripts", in response to network events. See NetworkManager(8) for details about these dispatcher scripts.
Servers, headless machines, and terminals: nmcli can be used to control NetworkManager without a GUI, including creating, editing, starting and stopping network connections and viewing network status.
NetworkManager stores all network configuration as "connections", which are collections of data (Layer2 details, IP addressing, etc.) that describe how to create or connect to a network. A connection is "active" when a device uses that connection's configuration to create or connect to a network. There may be multiple connections that apply to a device, but only one of them can be active on that device at any given time. The additional connections can be used to allow quick switching between different networks and configurations.
Consider a machine which is usually connected to a DHCP-enabled network, but sometimes connected to a testing network which uses static IP addressing. Instead of manually reconfiguring eth0 each time the network is changed, the settings can be saved as two connections which both apply to eth0, one for DHCP (called default) and one with the static addressing details (called testing). When connected to the DHCP-enabled network the user would run nmcli con up default , and when connected to the static network the user would run nmcli con up testing.
nmcli monitor
nmcli connection {show | up | down | modify | add | edit | clone | delete | monitor | reload | load | import | export} [ARGUMENTS...]
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
New Network Concept Network Profiles RHEL 7
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
13 Regular Expression with Grep Command RHCSA - Tech Arkit
1. Check Grep version
grep -V
2. Search single word in single file / multifles
grep string *
3. Search Multiple words in single file / multiple files
grep -E 'word1|word2'
4. Seach text which is not maching to string
grep -v "String" fileName
5. Print the matching string and its before lines
grep ens33 -A 4
6. Print the matching string and its after lines and its around lines
grep enss33 -B 4
grep ens33 -C 4
7. Search a string Recursively
grep -r string fileName
8. Grep the string with highlighted in color
grep --color=auto string file Name
export GREP_COLOR='1;30;43'
9. display the lines which does not matches all the given strings
grep -v -e "a" -e "b" -e "c" filename.txt
10. Get the count of given string from file
grep -c string filename
11. Search for files which are matching to the given string
grep -l this demo*
12. Beginning of line ^ using cap symble
grep "^Nov 10" messages.1
13. End of the line $ using dollar symble
grep "terminating.$" messages
? The preceding item is optional and matched at most once.
* The preceding item will be matched zero or more times.
+ The preceding item will be matched one or more times.
n The preceding item is matched exactly n times.
n, The preceding item is matched n or more times.
,m The preceding item is matched at most m times.
n,m The preceding item is matched at least n times, but not more than m times.
From the above output you can come to know when all the messages has got interrupt. Just like ^ matches the beginning of the line only if it is the first character, $ matches the end of the line only if it is the last character in a regular expression.
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
SELinux - Security Enhanced Linux Explained RHEL 7 - RHCSA - TechArkit
SeLinux : Security Enchanced Linux
SeLinux will support
. Port Level Security
. Sevice Level Security
. File Level Security
simply we can say 3 layer secuity.
SeLinux having 3 modes to manage security.
1. Enforcing: which means SeLinux is running with full enforcing mode, simple enabled mode.
2. Permissive: Permissive also says that SeLinux is running but it will not enforce, it will only logs the information.
3. Disabled: disable mode is simply disabled. SeLinux not in use.
Immediatly we get an question in mind that why there are three modes, Enable and disable modes are enough right.
Yes, i also got the same question when i was learning SeLinux. There is a reason behind that.
When we want to change the SeLinux mode from Enforcing to disabled we have to edit the configuration file /etc/selinux/config and change the SELINUX=disabled, config file will not be effected until unless server is rebooted.
Same for the changing the disabled mode to Enforcing mode.
but if you want to change Selinux mode from Enforcing to permissive doesn't required an reboot.
Now we understand that why SeLinux is disgned to have 3 modes.
Whenever you change the SeLinux mode from disable to enforcing after the reboot it will relabel all the SeLinux policies.
whenever you changed the SeLinux mode from Enforcing to Disabled after the reboot all the SeLinux policies will not go off, policies still exists but will not enforce.
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
Syslog Server Analyzing and Storing Logs - RHCSA
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
OpenSSH (Secure Shell) Server and Client Configuration - RHCSA
1. A cryptographic handshake is made so that the client can verify that it is communicating with the correct server.
2. The transport layer of the connection between the client and remote host is encrypted using a symmetric cipher.
3. The client authenticates itself to the server.
4. The client interacts with the remote host over the encrypted connection.
openssh-server package installed
X11 forwarding
ssh -Y username@hostname
ssh -L local-port:remote-hostname:remote-port username@hostname
sshd(8) — The manual page for the sshd daemon documents available command line options and provides a complete list of supported configuration files and directories.
ssh(1) — The manual page for the ssh client application provides a complete list of available command line options and supported configuration files and directories.
scp(1) — The manual page for the scp utility provides a more detailed description of this utility and its usage.
sftp(1) — The manual page for the sftp utility.
ssh-keygen(1) — The manual page for the ssh-keygen utility documents in detail how to use it to generate, manage, and convert authentication keys used by ssh.
ssh_config(5) — The manual page named ssh_config documents available SSH client configuration options.
sshd_config(5) — The manual page named sshd_config provides a full description of available SSH daemon configuration options.
SSH (Secure Shell) is a protocol which facilitates secure communications between two systems using a client-server architecture and allows users to log in to server host systems remotely. Unlike other remote communication protocols, such as FTP or Telnet, SSH encrypts the login session, rendering the connection difficult for intruders to collect unencrypted passwords.
The ssh program is designed to replace older, less secure terminal applications used to log in to remote hosts, such as telnet or rsh. A related program called scp replaces older programs designed to copy files between hosts, such as rcp. Because these older applications do not encrypt passwords transmitted between the client and the server, avoid them whenever possible. Using secure methods to log in to remote systems decreases the risks for both the client system and the remote host.
Red Hat Enterprise Linux includes the general OpenSSH package, openssh, as well as the OpenSSH
server, openssh-server, and client, openssh-clients, packages. Note, the OpenSSH packages require the
OpenSSL package openssl-libs, which installs several important cryptographic libraries, enabling
OpenSSH to provide encrypted communications.
/etc/ssh/sshd_config,access linux server via ssh,activate ssh server linux,add ssh key to server,bash ssh,centos 7 ssh,client ssh,config ssh,configure ssh banner linux,configure ssh keys linux
How to Get Help From Linux Command Line and Man Pages - RHCSA
Getting Help From Command Line
:: Getting Help From Command Line ::
Not most of the production Server will have access to internet, because of security reasons, wihtout internet access how you can get an help using your command line interface. which is not a step by step guide but it will give you an idea to execute the commands and how commands works.
In Order to get the help, we have to use below commands in most of the situations.
1. Man
2. Pinfo
3. Command --help
4. Info
5. Help command
Man is the system's manual pager. Each page arugument given to man is normally the name of program, utility or function.
1 Executable programs or shell commands
2 System calls (functions provided by the kernel)
3 Library calls (functions within program libraries)
4 Special files (usually found in /dev)
5 File formats and conventions eg /etc/passwd
6 Games
7 Miscellaneous (including macro packages and conventions), e.g. man(7), groff(7)
8 System administration commands (usually only for root)
9 Kernel routines [Non standard]
man ls
man -a intro
man -t alias | lpr -Pps
man -k printf
man -s 3 -K "open"
Spacebar – Scrolling man page down
PageDown/Down Arrow – Scrolling man page down
PageUp/Up Arrow – Scrolling man page UP
/string – Search for particular string
n (key) – Repeat search Up to down
N (key) – Repeat search Down to up
g – Go to first to man page
G – Go to end of the man page
q – Exit from man page
pinfo
info
Whereis
whatis
command --help
basic linux command man,get command from linux,get command linux example,get command path linux,get help for linux command,get help in linux,get help linux,install man command on linux
lvextend Extending Logical Volume Size non-disruptively - RHCSA
centos 7 lvextend root,centos 7 lvextend xfs,centos lvextend,centos lvextend ext4,command lvextend in linux,e2fsck lvextend
How To Delete Standard Partitions in Linux - Tech Arkit
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
Linux Disk Partitioning Creating Standard Partitions - RHCSA - Tech Arkit
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
Special File Permissions Linux - SUID, SGID and Sticky Bit - Tech Arkit
bit sgid linux
command to set sgid in linux
difference between suid and sgid in linux
example of sgid in linux
example of suid and sgid in linux
find sgid files linux
find suid sgid linux
how to check sgid in linux
how to remove sgid bit in linux
how to remove sgid in linux
how to set sgid bit in linux
how to set sgid in linux
linux - suid/sgid file creation,linux add sgid,linux chmod sgid,linux chmod suid sgid,linux droit sgid,linux file permissions sgid,linux find files with suid and sgid,linux find sgid,linux find suid sgid files
linux group sgid
linux kernel 3.13 - (sgid) privilege escalation
linux permissions suid sgid
linux remove sgid bit
linux set sgid
linux set sgid bit
linux set sgid on directory
linux sgid bit
linux sgid bit directory
linux sgid chmod
linux sgid directory
linux sgid folder
linux sgid not working
linux sgid on directory
linux sgid privilege escalation
linux sgid recursive
linux sgid suid
linux suid sgid and sticky bit
linux suid sgid bit
linux suid sgid directory
linux suid sgid sticky
linux umask sgid
remove sgid from file linux
remove sgid in linux
remove sgid linux
set sgid bit linux
set sgid linux
set suid and sgid in linux
sgid and sticky bit linux
sgid command in linux
sgid files in linux
sgid files linux
sgid for directories in linux
sgid in linux
sgid in linux with examples
sgid linux
sgid linux directory
sgid linux examples
sgid linux permissions
sgid permission in linux
suid and sgid file permission in linux
suid and sgid in linux
suid and sgid in linux examples
suid and sgid in redhat linux
suid and sgid linux
suid et sgid sous linux
suid sgid and sticky bit in linux
suid sgid in linux
suid sgid linux
suid sgid linux examples
suid y sgid linux
use of suid and sgid in linux
what is sgid bit in linux
what is sgid files in linux
what is sgid in linux
what is suid and sgid in linux
what is suid sgid and sticky bit in linux
ACL - Access Control List - Linux Permissions - RHCSA
POSIX Access Control List ACL : To manage file security using POSIX (Portable Operating System Interface) access control list ( ACL ).
ACLs allows to assign different permissions for different users and groups. ACL allows fine-grained permissions to be allocated to a file. Users or groups as well as users and groups identified by a UID or GUID can be granted permissions.
The same permissions we can use below flags apply on files and directories.
Alpha Symbols
r: Read
w: Write
x: Execute
Numeric symbols
4 – Read
2 – Write
1 – Execute
- Permissions restricting access to a file to the file owner, membership of a single group or everyone.
- The file owner can set ACLs on individual files or directories.
- XFS file systems have built in ACL support.
- EXT4 file systems created on RHEL7 have ACL enabled by default.
POSIX Access Control List two types:
Access ACLs: we can use access ACLs to grant permissions for a particular file or directory.
Default ACLs: We can use default ACLs only on a directory but if a file inside that directory does not have an ACL, it inherits the permissions of the default ACLs of the directory.
https://arkit.co.in/posix-access-control-list-acl/
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
ACLs allows to assign different permissions for different users and groups. ACL allows fine-grained permissions to be allocated to a file. Users or groups as well as users and groups identified by a UID or GUID can be granted permissions.
The same permissions we can use below flags apply on files and directories.
Alpha Symbols
r: Read
w: Write
x: Execute
Numeric symbols
4 – Read
2 – Write
1 – Execute
- Permissions restricting access to a file to the file owner, membership of a single group or everyone.
- The file owner can set ACLs on individual files or directories.
- XFS file systems have built in ACL support.
- EXT4 file systems created on RHEL7 have ACL enabled by default.
POSIX Access Control List two types:
Access ACLs: we can use access ACLs to grant permissions for a particular file or directory.
Default ACLs: We can use default ACLs only on a directory but if a file inside that directory does not have an ACL, it inherits the permissions of the default ACLs of the directory.
https://arkit.co.in/posix-access-control-list-acl/
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
Creating Linux Groups and Securing them with Password - RHCSA
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
25 Basic Linux Commands Commonly Used in Daily Tasks
Youtube PlayLists
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
Shell-Scripting: https://goo.gl/a1Hu3s
Linux-Commands: https://goo.gl/QDoL7h
RHCSA Certification: https://goo.gl/X2Ksqn
Putty Software Tricks: https://goo.gl/MB1Do2
Linux OS: https://goo.gl/62p8s9
Follow Us on Social Media
Telegram Group: https://goo.gl/KPvMda
https://arkit.co.in/one-linux-tutorial/
Reddit: http://bit.ly/redditark
https://goo.gl/mcUvef
Mailing List: http://bit.ly/feedburnerark
https://goo.gl/fb/WAU7JG
Facebook: https://fb.com/linuxarkit
https://goo.gl/2QN4sD
LinkedIn: http://bit.ly/linkedark
https://goo.gl/ZLcikC
Twitter: https://twitter.com/aravikumar48
Google Plus: http://bit.ly/gplusark
https://goo.gl/79zwX9
Introduction to Linux Operating System
red hat certification,red hat linux certification,rhce,rhcsa,rhce certification,red hat certification cost,red hat certified engineer,rhel certification,red hat certification course,rhcsa exam,red hat course,rhcsa training,red hat courses,linux certification courses,rhce exam,red hat certification path,rhce certification cost,linux certification training,rhce exam fee,red hat certification fees
Bash Programming Play List: https://www.youtube.com/watch?v=7GNUzvjS_mE&list=PL8cE5Nxf6M6b8qW7CSMsdKbEsPdG9pWfu
Facebook Page: https://www.facebook.com/Linuxarkit/
LinkedIn Profile: https://www.linkedin.com/in/ravi-kumar-94530121
Google Plus: https://plus.google.com/u/0/+RedhatEnterpriseLinuxStepbyStepGuide
Twitter: https://twitter.com/aravikumar48
RSS Feed: https://feedburner.google.com/fb/a/mailverify?uri=arkit
Reddit: https://www.reddit.com/user/aravikumar48/
Tumblr: https://www.tumblr.com/blog/aravikumar48
Bash Programming Play List: https://www.youtube.com/watch?v=7GNUzvjS_mE&list=PL8cE5Nxf6M6b8qW7CSMsdKbEsPdG9pWfu
Facebook Page: https://www.facebook.com/Linuxarkit/
LinkedIn Profile: https://www.linkedin.com/in/ravi-kumar-94530121
Google Plus: https://plus.google.com/u/0/+RedhatEnterpriseLinuxStepbyStepGuide
Twitter: https://twitter.com/aravikumar48
RSS Feed: https://feedburner.google.com/fb/a/mailverify?uri=arkit
Reddit: https://www.reddit.com/user/aravikumar48/
Tumblr: https://www.tumblr.com/blog/aravikumar48
RHCSA Certification Course Overview - Tech Arkit
A Red Hat Certified System Administrator (RHCSA) is able to perform the following tasks :simple_smile:
- Understand and use essential tools for handling files, directories, command-line environments, and documentation
- Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services
- Configure local storage using partitions and logical volumes
- Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems
- Deploy, configure, and maintain systems, including software installation, update, and core services
- Manage users and groups, including use of a centralized directory for authentication
- Manage security, including basic firewall and SELinux configuration
Wrap Up And Next Steps for Advanced Shell Scripting
:: Tech Arkit ::
https://techtutorials.github.io/shell-scripting-tutorial/
https://github.com/techtutorials/shell-scripting-tutorial
https://arkit-in.tradepub.com/free/w_wile48/ - Book1
https://arkit-in.tradepub.com/free/w_pack42/ - Book2
https://arkit-in.tradepub.com/free/w_advb01/ - Book3
https://arkit-in.tradepub.com/free/w_wile54/ - Book4
https://arkit.co.in/category/all-scripts/ - Text Tutorial
https://goo.gl/KPvMda - Telegram Group
https://techtutorials.github.io/shell-scripting-tutorial/
https://github.com/techtutorials/shell-scripting-tutorial
https://arkit-in.tradepub.com/free/w_wile48/ - Book1
https://arkit-in.tradepub.com/free/w_pack42/ - Book2
https://arkit-in.tradepub.com/free/w_advb01/ - Book3
https://arkit-in.tradepub.com/free/w_wile54/ - Book4
https://arkit.co.in/category/all-scripts/ - Text Tutorial
https://goo.gl/KPvMda - Telegram Group
Monitoring Disk Space utilization and Send Email Alert
#linux #linuxformat #linux4ever #Linux #linuxadmin #linuxshell #linuxuserofficial #linuxfan #linuxcentos #linuxpenguin #linuxcards #linuxbased #linuxkeough #linuxthedog #linuxinside #linuxcomics #linuxpro #linuxservers #linuxlife #linuxforever #linuxgames #linuxforhumanbeings #linuxmasterrace #linuxubuntu #linuxthebengal #linuxlover #linuxkernel #linuxekibi #linuxhosting #linuxgamer
Monitoring Disk Space utilization and Send Email Alert
#linux #linuxformat #linux4ever #Linux #linuxadmin #linuxshell #linuxuserofficial #linuxfan #linuxcentos #linuxpenguin #linuxcards #linuxbased #linuxkeough #linuxthedog #linuxinside #linuxcomics #linuxpro #linuxservers #linuxlife #linuxforever #linuxgames #linuxforhumanbeings #linuxmasterrace #linuxubuntu #linuxthebengal #linuxlover #linuxkernel #linuxekibi #linuxhosting #linuxgamer
Making Real Time CPU Utilization Monitoring Script - Tech Arkit
#linux #linuxformat #linux4ever #Linux #linuxadmin #linuxshell #linuxuserofficial #linuxfan #linuxcentos #linuxpenguin #linuxcards #linuxbased #linuxkeough #linuxthedog #linuxinside #linuxcomics #linuxpro #linuxservers #linuxlife #linuxforever #linuxgames #linuxforhumanbeings #linuxmasterrace #linuxubuntu #linuxthebengal #linuxlover #linuxkernel #linuxekibi #linuxhosting #linuxgamer
Subscribe to:
Posts (Atom)