We can able restrict Disk space once we enable disk quota which alerts a sysadmin before a user takes too much disk space or a partition becomes full.Quotas can only be created for partitions.Quota is of two types, user and group.
Security-Enhanced Linux (SELinux) is a Linux feature that provides the mechanism for supporting access control security policies.But SELinux can sometimes get in your way. In that case you need to turn off-disable SELINUX. However before you turn off-disable SELINUX make sure you have a valid reason ,why you are doing it.
With RHEL 7 RedHat has made significant changes the way Linux used to work. Here we are discussing New features in RHEL 7.
Kali Linux is derived from Debian Linux flavor and its mainly used for penetration tasting. It has more than 300 pre-installed penetration-testing programs. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits. Let begin with hack windows with Kali Linux.Kindly note that , I am writing this post for education purpose only.
With AWS you can build free server on aws that to within a minute.amazon AWS offers free tier with a server “micro-instance” at no cost for one year.
Normally Linux servers are very much secured and illegal or unauthorised access is almost not possible with security policies in linux. However if linux can be installed on the laptop which makes it unsecured and worst situation occurs when you forget the laptop in public places such as trains, airports or bus where any proficient […]
Generally speaking Logs are very much important part of any troubleshooting activity, However these logs grows in size with time. In this case we need to perform log cleanup manually in order to reclaim the space and its tedious task to administer these logs. To overcome this we can configure logrotate utility available in Linux which automatically does […]
With the help of LVM snapshot backup we can freeze current state of an LVM volume. Making LVM snapshot backup make us to keep current state of volume and we can revert this state back if any needs arises during activity. A volume consists of two parts: file system metadata and the actual blocks containing data in a […]