You are well aware of the fact that while installing linux operating system you need to enter lot of input like ip address, hostname, partition details, root password etc. And its gets bore when you need to perform this operation on number of hosts. Of course there is an option of vmware image for linux installation. But you can also do perform automated kickstart linux installation. Hence I am writing this article about performing automated kickstart linux installation with minimal requirements.
Some times it’s become necessary to find current boot disk path in Linux. The Boot disk path linux can be used for troubleshooting purpose in case any issues. This Boot partition or path contains the GRUB configuration which is bootloader in Linux.
You might be using famous putty tool for connecting to your server via ssh or telnet. However there is one more way , with which you can connect via Browser. Yes you heard it right you can connect server using Chrome web browser. No need of putty tool always. By using chrome extension Secure Shell you can connect server using Chrome web browser.
How do you experience when something goes wrong on your system. You look at the system logs, of course! In all seriousness, understanding system logging is important so that you can troubleshoot when something went wrong. In Linux system we have syslog which captures every activity occurring on the system. Generally they are stored on the local system at location “/var/log/messages” but we can configure centralized syslog server where we can dump all the logs centrally to monitor all the logs in one go.
We can able restrict Disk space once we enable disk quota which alerts a sysadmin before a user takes too much disk space or a partition becomes full.Quotas can only be created for partitions.Quota is of two types, user and group.
Security-Enhanced Linux (SELinux) is a Linux feature that provides the mechanism for supporting access control security policies.But SELinux can sometimes get in your way. In that case you need to turn off-disable SELINUX. However before you turn off-disable SELINUX make sure you have a valid reason ,why you are doing it.
With RHEL 7 RedHat has made significant changes the way Linux used to work. Here we are discussing New features in RHEL 7.
Kali Linux is derived from Debian Linux flavor and its mainly used for penetration tasting. It has more than 300 pre-installed penetration-testing programs. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits. Let begin with hack windows with Kali Linux.Kindly note that , I am writing this post for education purpose only.