Jump to content

Search the Community

Showing results for tags 'linux'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 53 results

  1. INE - Automation Bundle (2015) Instructors: Multiple Format: FLV Size: 20.28GB Here's what's in the bundle, enjoy!!! Note: Make sure you seed for ratio 1.5 for future torrents also!!! [Hidden Content]
  2. Hi, I'm new in redhat exam I don't know how to register for exam? Do I have to register in vue? Help please
  3. Is there a specialized distributions analyzed malware I want to do my analysis of malicious software so I want to dangerous malware within a controlled environment
  4. vishakkv

    What is Docker?

    Any one who know about docker, please give detailes descripition and also provide tutorials especially videos regarding the dockers
  5. 1. NULL ROUTE: Sometime you want to block some intruder if you find the ip , no need to play with iptables. For example if you have the server which is receiving continues attack from the ip 67.89.34.54 then you can block such a way. localhost:-$ route add -host 67.89.34.54 gw 127.0.0.1 it will act as a black hole and drop the traffic within the machine and intruder won't get any reply. 2. Create the stack of directories in a single command: When we want to create multiple directories in a stack format , what would you do perform the activity in short time. here you have localhost:-$ mkdir -p test/{1..10}/{1..10} First it will create the directory called test and under test it will create 10 folders from 1 to 10. And each 1 to 10 directories contain the sub-directory from 1 to 10. 3. TAB KEY SHORT CUTS:(T - TAB) a. TT - all available command b. /TT - all folders in that directory including hidden c. $TT - All available Environmental variable in STDOUT.
  6. IPTABLES TUTORIAL: iptables is the open source firewall , default it is integrated with linux kernel itself. usually backend is called as netfilter. iptables is the tool which helps us to manage the netfilter firewall. it has all the functionalities what commercial firewall has like natting, filtering. by writing the efficient rules in the iptables we can save our environment from external threats. it is also stateful firewall. what is stateful firewall? stateful firewall ultimately track the state of the packets which is moving through our firewall machine. in tcp stack implementation if you analyze the tcp header we have one field called fragment id. when packet been fragmented it will be assigned with common fragment id. example if you blocked the icmp packets in your firewall and if it is not stateful firewall what happen?. if the packet exceeds the actual mtu size then it will be fragmented by our stack. and the first packet only consist the protocol field with the flag set as mf(more fragments 1). then other than first packet another packet does not have the protocol field. only all the packets shared the common fragment id. so stateless firewall block the first packet , because it holds icmp in it protocol field. other then first packet all packets allowed by our firewall. because all other packets does not have the protocol header. but what stageful firewall will do, if any packet matches the rule it will track both the protocol field and fragment id field in one table ,which is called stateful table. here all the tracked packet infos has been maintaining by our firewall. in our case it will track the first icmp packet fragment id, and if any packets arrived with the same fragment id it will be discarded. this is the mechanism how stateful operates. iptables packet processing mechanism: 1. look for the state table whether the arrived packets info available or not. 2. if matches then do the action(drop/accept/log) 3. if info not available in the state table then look for the routing table. 4. if routing to the local destination then look for the filter table to take the necessary action. 5. if routing is to the external destination then look for the nat table. and if it is snat then post-routing will be done. 6. if it is dnat then pre-routing will be performed. tables in iptables: 1. mangle table 2. nat table 3. filter table each table contain some chains to take the decision : 1. mangle table a. input b. output c. forward d. pre-routing e. post-routing 2. nat table: a. pre-routing b. post-routing 3. filter table: a. input b. output c. forward next part will be posted once i prepared..thanks for reading...
  7. Cisco IOU Collection v4. Magnet link: [Hidden Content] File list: L2 images =================== i86bi-linux-l2-upk9-12.2.bin Cisco IOS Software, Linux Software (LINUXL2-UPK9-M), Experimental Version 12.2(20100802:165548) [mtimm-mtrosel2iol 102] Compiled Mon 02-Aug-10 10:05 by mtimm SHA256: 74154e4aac94b540655183be933c50fe5dabe478a060e4639c4ddca31f8586d6 i86bi-linux-l2-upk9-15.0a.bin Cisco IOS Software, Linux Software (I86BI_LINUX_L2-UPK9-M), Experimental Version 15.0(20120621:060510) [dstivers-june20-2012-golden_spike 101] Compiled Wed 20-Jun-12 23:58 by dstivers SHA256: a7e3f7782960621a1cd27d30994b4c1fe8fb7d49f04eed18336bcac497414c31 i86bi-linux-l2-upk9-15.0b.bin Cisco IOS Software, Linux Software (I86BI_LINUX_L2-UPK9-M), Experimental Version 15.0(20121031:162848) [dstivers-oct25-2012-golden_spike 103] Compiled Wed 31-Oct-12 09:42 by dstivers SHA256: f94f1c8d227e126f4dce226e6c654b5c658db168a5222351973c2a42460e2a05 i86bi-linux-l2-ipbasek9-15.1a.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-IPBASEK9-M), Experimental Version 15.1(20130124:233217) [dstivers-jan24-2013-team_track 101] Compiled Thu 24-Jan-13 16:17 by dstivers SHA256: 178b1add68deafa874f164b92b0f9b89171c5efe95d4b32098296c2b38f8272a i86bi-linux-l2-ipbasek9-15.1b.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-IPBASEK9-M), Experimental Version 15.1(20130124:233217) [dstivers-jan24-2013-team_track 154] Compiled Thu 14-Feb-13 15:45 by dstivers SHA256: 223c5b63c3f7fbb671b85ff0620fb76efed8f13df6a7e34153003cb7104b0b49 i86bi-linux-l2-ipbasek9-15.1c.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-IPBASEK9-M), Experimental Version 15.1(20130509:024903) [dstivers-may8-2013-team_track 103] Compiled Wed 08-May-13 21:05 by dstivers SHA256: b7a1695fb3cbc54d1c32d37074e6c0b66583d50f420b3452b337784f92935ed6 i86bi-linux-l2-ipbasek9-15.1d.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-IPBASEK9-M), Experimental Version 15.1(20130426:181134) [dstivers-apr26-2013-team_track 101] Compiled Fri 26-Apr-13 11:53 by dstivers SHA256: bfaba63a73e84df726c2e0f2847c47749b91c8a961b1f27c299503f357df6154 i86bi-linux-l2-ipbasek9-15.1e.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-IPBASEK9-M), Experimental Version 15.1(20130617:213916) [dstivers-june-17-2013-team_track 101] Compiled Mon 17-Jun-13 15:28 by dstivers SHA256: bed4a8bface945d3e255a0d414f90aea50814dab4e9647e4058ebbebed146fb2 i86bi-linux-l2-ipbasek9-15.1f.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-IPBASEK9-M), Experimental Version 15.1(20121123:074833) [dstivers-nov22-2012-team_track 101] Compiled Fri 23-Nov-12 09:50 by dstivers SHA256: 881880503c38001e93be3008319067974a17f59bab52303c9373f032a5d1fa20 i86bi-linux-l2-ipbasek9-15.1g.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-IPBASEK9-M), Experimental Version 15.1(20130726:213425) [dstivers-july26-2013-team_track 105] Compiled Fri 26-Jul-13 16:12 by dstivers SHA256: 50f49fac24fc1621f5450a086db4858a8a5947ec69774588ca9f9f1074871f83 i86bi-linux-l2-adventerprisek9-15.1a.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-ADVENTERPRISEK9-M), Experimental Version 15.1(20130726:213425) [dstivers-july26-2013-team_track 104] Compiled Fri 26-Jul-13 15:56 by dstivers SHA256: 2d6c1e5e420549d84a4fbc5448cf65991d506a27d37557d1cb7a516d50fac198 i86bi-linux-l2-adventerprise-15.1b.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-ADVENTERPRISE-M), Experimental Version 15.1(20131216:211730) [mmen 106] Compiled Mon 16-Dec-13 13:50 by mmen SHA256: fdb919cc68ae7306eae3a717dc360b57d0c049ea48c9d819ac7c8e678d9e55a8 i86bi-linux-l2-adventerprisek9-15.1c.bin Cisco IOS Software, Solaris Software (I86BI_LINUXL2-ADVENTERPRISEK9-M), Experimental Version 15.1(20140814:053243) [mmen 112] Compiled Thu 14-Aug-14 08:28 by mmen SHA256: 5c1ce9b1766fe8441986ba5e3cedd72278e3f10d62503c67db03112a76b2cff2 i86bi-linux-l2-adventerprisek9-15.2a.bin Cisco IOS Software, Linux Software (I86BI_LINUXL2-ADVENTERPRISEK9-M), Version 15.2(CML_NIGHTLY_20150703)FLO_DSGS7, EARLY DEPLOYMENT DEVELOPMENT BUILD, synced to DSGS_PI5_POSTCOLLAPSE_TEAM_TRACK_CLONE Compiled Sat 04-Jul-15 01:30 by mmen SHA256: f813565d34ea0ec614e68eab75896fb6c59a311b62582a78641d8c4f72da4a6f i86bi-linux-l2-adventerprisek9-15.2b.bin Cisco IOS Software, Linux Software (I86BI_LINUXL2-ADVIPSERVICESK9-M), Version 15.2(CML_NIGHTLY_20150703)FLO_DSGS7, EARLY DEPLOYMENT DEVELOPMENT BUILD, synced to DSGS_PI5_POSTCOLLAPSE_TEAM_TRACK_CLONE Compiled Sat 04-Jul-15 01:30 by mmen SHA256: 4f2551b2f0889fcc4e58c777f88a1f4bfd40ab49b86a4ee713aea41cd91b0f21 i86bi-linux-l2-adventerprisek9-15.2c.bin Cisco IOS Software, Linux Software (I86BI_LINUXL2-ADVENTERPRISEK9-M), Version 15.2(CML_NIGHTLY_20151103)FLO_DSGS7, EARLY DEPLOYMENT DEVELOPMENT BUILD, synced to FLO_DSGS7_POSTCOLLAPSE_TEAM_TRACK_DSGS_PI5 Compiled Wed 04-Nov-15 02:31 by mmen SHA256: 2e43ecf29b60dfd02b7c45df65fa6518fec680c38764a2f2685d2371391b22c8 i86bi-linux-l2-adventerprisek9-15.2d.bin Cisco IOS Software, Linux Software (I86BI_LINUXL2-ADVIPSERVICESK9-M), Version 15.2(CML_NIGHTLY_20151103)FLO_DSGS7, EARLY DEPLOYMENT DEVELOPMENT BUILD, synced to FLO_DSGS7_POSTCOLLAPSE_TEAM_TRACK_DSGS_PI5 Compiled Wed 04-Nov-15 02:31 by mmen SHA256: f7bd941a33e7101c64585ce376ab9377a264a8b4fbc86084e32c2822804ac366 i86bi-linux-l2-adventerprisek9-15.6.0.9S.bin Cisco IOS Software, Linux Software (I86BI_LINUX_L2-ADVENTERPRISEK9-M), Version 15.6(0.9)S, EARLY DEPLOYMENT ENGINEERING WEEKLY BUILD, synced to BLD_DARLING_122S_040709_1301 Compiled Tue 14-Jul-15 11:02 by alnguyen SHA256: d40063e1c106f3e51d4fec5760b99ba7d90189bb3e2c014479069a8371b92ae6 L3 images =================== i86bi-linux-l3-ipbase-12.4.bin Cisco IOS Software, Linux Software (I86BI_LINUX-IPBASE-M), Experimental Version 12.4(20090407:185408) [yuiu-redbuild-V124_24_5_6_PIC1 166] Compiled Wed 08-Apr-09 01:29 by yuiu SHA256: be0c10098bc150ef6fa32f36e668da4a02e475ab7d4af8fc40d13f9934552bb7 i86bi-linux-l3-p-15.0a.bin Cisco IOS Software, Linux Software (I86BI_LINUX-P-M), Experimental Version 15.0(20120621:202753) [dstivers-june20-2012-golden_spike 102] Compiled Thu 21-Jun-12 13:38 by dstivers SHA256: 46d060d1c12dd21ab44e3c6ddfaa1c8de7bf0e8cf479e0aae3a19cf5391d4186 i86bi-linux-l3-p-15.0b.bin Cisco IOS Software, Linux Software (I86BI_LINUX-P-M), Experimental Version 15.0(20121031:154527) [dstivers-oct25-2012-golden_spike 102] Compiled Wed 31-Oct-12 09:15 by dstivers SHA256: 1ec8b1c64d7f0bcf65ea57ee553ed4f4c6b3db1155919cd0cb700fcef90b09e0 i86bi-linux-l3-jk9s-15.0.1.bin Cisco IOS Software, Linux Software (I86BI_LINUX-JK9S-M), Version 15.0(1)XJR111.358, INTERIM SOFTWARE Compiled Sun 08-Jan-12 07:38 by integ SHA256: d493a76566fbe3db0f3b84db29de977ab81aa0190be5e8bfd6d5e78aaebcb697 i86bi-linux-l3-adventerprisek9-12.4.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Experimental Version 12.4(20090407:185408) [yuiu-redbuild-V124_24_5_6_PIC1 177] Compiled Wed 08-Apr-09 02:09 by yuiu SHA256: 645669c297d7be96c73645d01ed9df72cea1190ac650f94db97bc51862420336 i86bi-linux-l3-adventerprisek9-15.2.2.03T.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.2(2.3)T, ENGINEERING WEEKLY BUILD, synced to V151_4_M1_13 Compiled Thu 13-Oct-11 01:08 by hlo SHA256: 63e2da2bd53bea265f5c55c94bc5847d700c8d2982e0d52b2f1ac15d70a34036 i86bi-linux-l3-adventerprisek9-15.2.2.15T.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.2(2.15)T, ENGINEERING WEEKLY BUILD, synced to V151_4_M3_5 Compiled Sun 29-Jan-12 02:33 by SHA256: 31b50b886246657344af801de56fa82c0b0554867b8fc00227ca66e3441b4095 i86bi-linux-l3-adventerprisek9-15.2.4M1.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.2(4)M1, DEVELOPMENT TEST SOFTWARE Compiled Fri 27-Jul-12 10:57 by prod_rel_team SHA256: 076a1e3d32975ef1ee61ce7a90028812307d35b4f859e469790c4d46b8445364 i86bi-linux-l3-adventerprisek9-15.3.1.3T.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.3(1.3)T, ENGINEERING WEEKLY BUILD, synced to V152_4_M1_10 Compiled Thu 25-Oct-12 04:35 by hlo SHA256: f6b5b3d756adcda7da5f3033ad10366e4eb2240b1959b8b9861e5a292ecb24da i86bi-linux-l3-adventerprisek9-15.4.1T.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.4(1)T, DEVELOPMENT TEST SOFTWARE Compiled Sat 23-Nov-13 03:28 by prod_rel_team SHA256: b0ce6dff94265d3bbb6733a694deeebbd20e17cc78d028398979a973599b6552 i86bi-linux-l3-adventerprisek9-15.4.2T.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.4(2)T, DEVELOPMENT TEST SOFTWARE Compiled Thu 27-Mar-14 01:08 by prod_rel_team SHA256: 32d7c68321df3c339d0592123e3e0624bfd91245c1fe088745379121b0546596 i86bi-linux-l3-adventerprisek9-15.4.2T4.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.4(2)T4, DEVELOPMENT TEST SOFTWARE Compiled Thu 08-Oct-15 21:21 by prod_rel_team SHA256: 7629c0ca697ccf797d1d5210737e41a78879a352619c69f4a1fd36ab2cc69e4c i86bi-linux-l3-adventerprisek9-15.5.2T.bin Cisco IOS Software, Linux Software (I86BI_LINUX-ADVENTERPRISEK9-M), Version 15.5(2)T, DEVELOPMENT TEST SOFTWARE Compiled Thu 26-Mar-15 07:36 by prod_rel_team SHA256: dc74c28bfb45e8298ce220aedb21940d1f5e7c5d1967d13da5e339741c9619a9 i86bi-linux-l3-tpgen-ipbase-12.4.bin Cisco IOS Software, Linux Software (I86BI_LINUX-TPGEN+IPBASE-M), Experimental Version 12.4(20090714:160619) [shgautam-commit-layer 108] Compiled Wed 15-Jul-09 15:07 by shgautam SHA256: 2280b992bad65bd087a0ac1bd329d237fd7e0f18f388726a9cf4f1ec0ff2d950 i86bi-linux-l3-tpgen-adventerprisek9-12.4.bin Cisco IOS Software, Linux Software (I86BI_LINUX-TPGEN+ADVENTERPRISEK9-M), Experimental Version 12.4(20090714:160619) [shgautam-commit-layer 105] Compiled Wed 15-Jul-09 14:44 by shgautam SHA256: cfcabafb7a4fb819e365f44d05f4aadcd9ec4eac25cbdf1d80dc478006cb118d Utilities =================== export_conf.sh Expect script to export the routers configurations. SHA256: d27240c36b06ea6db6010ccf5ed776d90edd290c94f16191d97a3439421433bc iou2net.pl Perl script to connect a IOU router with a virtual machine or to a physical interface. SHA256: 0be2978703044eb4bf6ca8849abc8a00ef7b3ddf8e4b22e43e02daccbb61f8fa iousniff A sniffer for IOU devices (compiled). Source code: [Hidden Content] SHA256: 00e0252ff94ecef5ce2a640250756600de1e114010fb3bbeb5279fc2693d4389 iousniff.7z GIT repository of iousniffer (source code). SHA256: ceda528f86ecae9945f626c704021878ead82ecde3f7711fbd35329e041f063e keygen.py Python script to generate the license file. SHA256: 7c0ebceb24b15969a474e46aba5631a3a31eac2abf1aef741a16ba62c0fa550b wrapper.bin A program for access to the consoles with telnet. SHA256: d4523cce88ecc5e0b69edbee52c4a6d825661c5f07b15765a70373d0c8e78a10 wrapper.pl A perl script for access to the consoles with telnet. SHA256: fdde0b6f4d53627864fedcf3b670b0c35367078b889ffd892bc05c9862388a34 wrapper.py A python script for access to the consoles with telnet. SHA256: e4ec91a9bfe31437439026be5c1c7c8cee0e51d126b120987c3bc2ed8bf9ee56
  8. Any one have penetration testing with kali linux v1.1.6 pdf ? Topic moved. Kindly open topics in proper section with correct prefix.
  9. arun1337

    which linux dist

    Hello everyone which linux is best for pentesting purposes I hear from everyone that kali is the best but some says it is for noobs
  10. Hi Guys, Anyone who can assist with material for ex415: Red Hat Certified Specialist in Security.
  11. Hello guys , this is a video tutorial that explains (LVM) - how to create logical volume group - how to extend logical volume - how to create physical partitions - how to add physical partitions to logical volume group
  12. I am a beginner at Red Hat and linux overall, I was trying to follow CBT series where the instructor tried to install a really old 90s program that displays images, I did just the same, except I found missing dependencies error, and I looked up the dependencies and downloaded them, when I install them I get another error, sometihng like transaction error, I'm sorry for being a beginner and having not so good English, isn't my first language Can anyone help me? I'm running it on vmware, could that be the problem?
  13. HI ALL, IN LINUX ADMIN LIFE WE HAVE TO DO A LOT OF ACTIVITIES TO MAINTAIN THE RELIABILITY OF THE MACHINE. WHILE DOING SOME OF THE ROUTINE JOB MAKES US UNHAPPY. SO, IN THIS TUTORIAL I WILL EXPLAIN SOME OF THE COMMANDS WHICH MAKES ADMIN LIFE EASY AND HAPPRY. 10 COMMANDS ALL SYSTEM ADMINISTRATOR SHOULD KNOW: 1.CDPATH VARIABLE : Most of the time System admins works under /etc directory. whenever he launched the shell it will offer the default HOME PATH of the admin. so for example he wants to CD the mail directory under the /etc he has to issue the following command. # cd /etc/mail but CDPATH variable makes our job simple export CDPATH=/etc now it doesn't matter which directory you are. you can easily cd the mail path GhostProtocol:~ prakashkumar$ pwd /Users/prakashkumar GhostProtocol:~ prakashkumar$ cd mail -bash: cd: mail: No such file or directory GhostProtocol:~ prakashkumar$ export CDPATH=/etc GhostProtocol:~ prakashkumar$ cd mail /etc/mail GhostProtocol:mail prakashkumar$ pwd /etc/mail 2. HISTORY WITH DATE AND TIME: when we want to review the commands, which has been executed we may get only the commands with number. But wouldn't be nice if you get the TIME and DATE also?. To get this functionality issue the following command # export HISTTIMEFORMAT=' %F %T ' 3.ALIAS FEATURE: most of the time the permanent LINUX users need to be give the same command again and again. If it is small then ok. what if it is big?. So to solve we have the future called alias. alias enables us to the command with shortcut which is pre defined by us. For example most of the time network admins want to check the connectivity by pinging the WAN DNS, which is 8.8.8.8. it is routine job and it is most used command by network admins. so to make it easy alias p8="ping 8.8.8.8" SYNTAX: alias <your cmd>="actual command" 4. In multi-admin environment we want to know who executed which command. that time it is not possible if you have the same .bash_history file(Which is the file, hold the executed the commands by the local users. Usually it will be in users home directory). So to create a new history file based on the users, do the following steps. A. Login to the machine with root permission. B. Go to /ho me/user1 ----> edit .bash_profile C.place the following command in this .bash_profile file CMD: HISTFILE=/root/user1.history Like that as many users we have we can create that many history files. And all the commands executed by the user1 will be stored in user1.history file. 5. Enable SHELL timeout: export TMOUT= 300 it will wait for 300 seconds to expire the shell automatically, if the shell is ideal for 300 seconds. NOTE: To make effect permanently add these commands in .bash_profile. Then re-login to the shell.
  14. ethernet bonding in Linux: We can configure the ethernet link aggregation through the following way. 1. Enable the bonding kernel module: # vi /etc/modprobe.d/bond.conf it should contain the following items alias bond0 bonding 2. create the network script for the bond0 # vi /etc/sysconfig/network-scripts/ifcfg-bond0 DEVICE = "eth0" IPADDR = 192.168.100.100 NETMASK = 255.255.255.0 ONBOOT = YES BOOTPROTO = none USERCTL = no BONDING_OPTS = "primary=eth1" 3. Edit the eth1 interface DEVICE = eth1 BOOTPROTO = none ONBOOT = yes MASTER = bond0 SLAVE = YES USERCTL = no 4. Edit the eth2 interface DEVICE = eth2 BOOTPROTO = none ONBOOT = yes MASTER = bond0 SLAVE = YES USERCTL = no then make the bond0 interface up by issuing the following command #ifconfig bond0 up
  15. Hello all, I have no experience with Linux envirnments so please help me out here: A server is to be bought with Redhat Linux installed. A guy must establish a remote connection through internet on this server so that he can instal a program. What are my options? I have no clue. In the office where i am going to attempt this, there is a DSL line with a small router (one public IP) Thank you.
  16. Guys, I am running IOU on Linux but I get excess collisions, some guys says this problem was solved. But I could not find anything yet. My IOU images: i86bi_linuxl2-upk-ms i86bi_linux-adventerprisek9-ms.152-2 Please help
  17. Hello again guys. I am having my exam on RHCE v6 like...veeery soon, and i still need some clarifications that so far i havent managed to answear my self. 1) Is there any chanse the domains and FQDNs of exam servers not to resolve properly? I noticed some people who posted questions and answears, that sometimes they use the ipaddress of the servers within the exams rather than their fqdn. For example, one guy on samba question states: In the above question, it is stated that the host did not work on the samba config. Anyone had previusly met such case in exam? 2) Are the questions clear as to what you are isntructed to do? Iv noticed questions which state tha: The above question does not state that only clients from example.com should have access to ssh. Hence the correct setup here would be just to deny l33t.org. However, i have also seen answears where only example.com is allowd on ssh. In either case, is it clear if you have to allow ssh only from example.com or just block l33t.org? 3) The myth of iscsi logout Finally, do you have to logout from iscsi target or not? IF yes? why do you have to logout Any tips and hints are most wellcome
  18. Is RHCE cert enough to start looking for an entry level (junior) RH admin job? Which any other certs (and the knowledge they represent) would be beneficial to have to actually get hired and start getting experience in redhat, so in the future I can go towards RHCA?
  19. I am planning career path to cybersecurity. I have finished my CCNA preparation recently. Now i want to learn Linux for my career. Which is better ? LPIC-1 or RHCSA?
  20. Hello friends , can anyone confirm which one is better to prepare for ? LPI or comptia linux+ ?
  21. Anyone with this video course yet? Livelessons - CompTIA Linux+ XK0-004 Complete Video Course, 2nd Edition by Sander van Vugt Appreciate if anyone could upload the course.
  22. hi all I have been studying for the rhcsa exam, currently revising a bit of the theory and trying to practice as much as I can (looking for exam type of questions everywhere)... In terms of the exam itself, I would like to clarify a few points with those who have already taken it: 1) I am planning to book the exam for October (UK) - classroom I think (Imparando or Globalknowledge). Can anyone recommend me a test centre in London? 2) Am I right in assuming that the exam will have the format of: 2x machines (virtual machines). VM1 server1 with "everything" already configured, i.e., dns, ntp, http/ftp repo, openldap, nfs VM2 station1 where you will actually perform all the tasks, i.e., create a repo to point to server1; configured dns client to point to server1, ntp to point to server1, authenticate and setup home directory for ldapuser on server1, user perms/acls, etc? 3) Which type of machine do you get logged on to, to then hop on server1/station1? I would very much appreciate your comments
  23. Hello, Currently i work as a system administrator but want to improve my skills in linux.I researched and found LPIC Exam 101 and 102.I have decided to do following.I will self study the material from LPIC video lectures and if neede refer a book. Will it be sufficiant?I am not totally new to linux.i know basic stuff. But problem and reason for creating this thread is where can i give exams?How can i schedule.Please if anyone from India can help me it would be nice. Or any other method you suggest for studying.As i am doing job i cannot attend any training institute and also i dont think the institute people teach properly. Thanks
  24. Guys i have a simple question and yet for me it's a dilemma, in Centos 6 i used to configure the network/domain using the ifcfg files and restart the network service, is it now essential to reload the files with nmcli ? so for example if i want to access example.com and i have the DNS and GATEWAY , what should i do ? i add them into the ifcfg-eth0 , resolv.conf and then run nmcli to reload the files ? and other than that i will not be able to access that network ? Thanks
  25. I recently found delta rpm, i would like to know if some people use this on production server and if it's safe?
×
×
  • Create New...