Linux – sudo file
The sudo command allows you to run programs with the security privileges of another user. Usually this command is used to run command as a superuser. The configuration files are : /etc/sudoers /etc/sudoers.d/* Instead of…
The sudo command allows you to run programs with the security privileges of another user. Usually this command is used to run command as a superuser. The configuration files are : /etc/sudoers /etc/sudoers.d/* Instead of…
Every file or folder created in a Linux system is associated with an iNode. The name given to the file is mapped to the inode created. Hard Link The below command creates two hard links to…
The SoS report command is a tool that collects various details from a Redhat Linux server. These details include configuration details, system information and diagnostic information such as the running kernel version, loaded modules, and…
NetworkManager Command Line Interface – The nmcli is a command-line utility which is used for controlling NetworkManager and reporting network status. View status of physical network device attached to a system [root@centos9vm ~]# nmcli device…
The way to configure network settings have drastically changes in versions after RHEL 7. The earlier method can be found in the below link: Check the available network links, the devices connected and…
What is it? Umask in Linux is a Linux command that is used to assign the default file permission sets that will be assigned when a file or a directory will be created by a…
In the world of running critical application, where we cannot afford downtime caused by hardware failures, it becomes necessary to run cluster of hardware, where the application can be automatically migrated to another running hardware,…
This is a continuation of the post “Bacula Backup Systems (Server)” which can be accessed by clicking here. In this employment the server, database and storage is hosted in one single server. To test the…
SELinux is a set of security rules using which we can control the processes/application that can access specific files, folders and ports. These processes, files, folders and ports has a special security label called SELinux…
This post is a continuation on previous posts. It is expected that you have a working Postfix server with Virtual Domain hosting, Dovecot based authentication and filtering using Spamassassin. The previous post in this series can be…