Friday, February 20, 2015

Sharing directories with NFS in Solaris 10

Sharing directories with NFS in Solaris 10

To share a directory in Solaria, the home of the users, or a directory with binaries.
With svcs the service status can be checked, so lets check the status of the nfs server:

#svcs network/nfs/server
STATE STIME FMRI
offline 2:19:03 svc:/network/nfs/server:default
The service is offline, so you have to enable it and start it, lets do it:
#svcadm enable -r network/nfs/server
#svcadm enable -s network/nfs/server
#svcadm restart network/nfs/server
Now it is started:
#svcs network/nfs/server
STATE STIME FMRI
online 2:29:51 svc:/network/nfs/server:default
Now, to share a directory, edit /etc/dfs/dfstab and add:
share -F nfs /export/test
Save the file and execute:
#shareall -F nfs
Now check the shares:
#share
- /export/test rw "" 

Monday, September 8, 2014

Step by Step creating partition in Red Hat Linux / How to create partition in Red Hat Linux environment ?

Create a 500MB new partition and should be mounted under /mountpoint as ext4 type.

Answer:

# fdisk -cul (for viewing the partition information)
# fdisk -cu /dev/vda
# m (for help)
# n (for new partition)
# e (for all spaces extended partition)
# Not p (because primary partition limit only 4)
# 3 (for partition number)
# Enter (for first cylinder)
# Enter (for last cylinder)
# w (for save)
# reboot (for rebooting the machine)

After rebooting the machine:    

# fdisk -cul (for viewing partition)
# fdisk -cu /dev/vda
# m (for help)
# n (for new partition)
# l (for logical partition)
# Enter (for first cylinder)
# +500M Enter (for last cylinder)
# w (for save)
# reboot (for rebooting the machine)

After rebooting the machine:    

# fdisk -cul (for viewing partition)
# mkfs.ext4 /dev/vda5
# mkdir -p /mountpoint (p for focely created one directory in another)
# mount /dev/vda5 /coss/new/
# df -h (for mounting information)
# vim /etc/fstab (for permanently mount)

  /dev/vda5         /mountpoint          ext4                       defaults               0 0

# mount -a

# df -h

difference between data and metadata



Metadata
 describes about data. It is ‘data about data’. It has information about how and when, by whom a certain data was collected and the data format. It is essential to understand information that is stored in data warehouses and xml-based web applications.

So, "meta" simply means "about the thing you're talking about". So metadata is data about the data. Data is information. Metadeta is information about the information. For example, you might have a chart that lists the population of each US State. You might then have details about that chart - what color it is, if it's a bar chart or a pie chart, what symbols are on it, etc. That would be metadata. 



Data dictionary is a file which consists of the basic definitions of a database. It contains the list of files that are available in the database, number of records in each file, and the information about the fields.

So,A data is individual facts, statistics, or items of information.Metadata describes other data. It provides information about a certain item's content. For example, an image may include metadata that describes how large the picture is, the color depth, the image resolution, when the image was created, and other data. A text document's metadata may contain information about how long the document is, who the author is, when the document was written, and a short summary of the document. 

Changing the Hostname (RedHat)

Changing the Hostname (RedHat)

hostname command by default will display the current hostname 

for temporarily change the hostname you may type :- 

# hostname xxx.yyyy.com                                                 

And it will be gone after reboot so , for permanently change it ,

RedHat based system use the file /etc/sysconfig/network to read the saved hostname at system boot.

# vi /etc/sysconfig/network 


NETWORKING=yes
HOSTNAME=xxx.yyyy.com


And after that reboot your system and hostname will be changed .








You may also check this links :- details provided with snapshot :- )
http://computernetworkingnotes.com/network-administration/network-setup-in-rhce6.html

Wednesday, June 4, 2014

how to break root pasword of linus with snapshot?

How to break root pasword of linus with snapshot?  Or,
How to set new password of root without log into the root user?

Step 01 : Press any button or space bar in the window . And Press "a" to modify.



Step 3: After that this window will come . after rhgb quiet >> write "1" . it will give you access to single user interface. 


Step 3 : After that when this window come . Write "passwd" and it will prompt to set the password . Now set the new password as your wish ! and reboot ! And enjoy :- )


Any Question ask me without any hesitation ?

Tuesday, June 3, 2014

ALL ABout Linux RedHut for EX300 (Will be continue updateing .. )

(1) Configure Host Name
# vim /etc/sysconfig/network

(2) Configure IP Address, Gateway and DNS.
Validate these profiles:
a) Check gateway: # vim / etc / sysconfig / network
b) Check Host Name: # vim /etc/hosts
c) Check DNS: # vim /etc/resolv.conf
d) Check Gateway: # vim /etc/sysconfig/network-scripts/ifcfg-eth0


Question 1
In accordance with the following requirements to deploy ssh login service:
(1) Make  example.com which can remote login your systems.
(2) Where, users of remote.test can not use ssh login to your machine.


[root@server1 ~]# grep sshd /etc/hosts.allow
sshd:.example.com
[root@server1 ~]# grep sshd /etc/hosts.deny
sshd:.remote.test

Note:
tcp_wrappers has two configuration files and their priority level is
/etc/hosts.allow->/etc/hosts.deny




Sunday, June 1, 2014

Trying to Explain TCP/IP Protocols, Components etc

Actually TCP and IP both are protocol suite.

Transmission Control Protocol(TCP) and Internet protocol(IP):- 


1. IP :- they control  Routing of information to different devices, servers , etc. deals with default address , gateway, DNS , It is routable protocol.

Internet protocol is used for transmission of data over the internet. IP uses IP addresses to identity each machine uniquely. Message is sent using small packets. The packet contains both the sender and receivers address. IP does not guarantee the delivery in the same order as sent. This is because the packets are sent via different routes. It is a connectionless communication protocol at the third level (network) of the OSI model.

2. TCP :- It actually means when Two computer connected it is the process the determined how this computer may talked to each other. It is OSI layer 4 (Transport Layer)

Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent. Hence it is most commonly used in all applications that require guaranteed delivery of data. It can handle both timeouts (if packets were delayed) and retransmission (if packets were lost). The stream of data is transmitted in segments. The segment header is 32 bit. it is a connectionless communication protocol at the third level (network) of the OSI model.

How these computer talked to each other? When they are connected what they do they started to send packet to each other. So, They Exchange packet with each other and they double their sending of packets from 1,2,4,8,16 ...  but every time they are facing interruption then they again staring they are from starting point means from 1 packets then 2 , 4, 8 . 16 ... And this process is called windowing.

How TCP/IP works:-

Components : - 
  • IP:- Every computer need IP address to communicate with each other. example:- 10.0.0.1,192.168.2.1 etc
  • Subnet mask :- Next you need Subnet mask and which helps to segment a network logically . but remember router connects different subnets. 
  • Default Gateway :- Then comes Default Gateway is the router for subnetwork. 
  • DNS :- Lastly comes DNS server which is used to mapped domain name with the ip address. 


·    Explain the classes of IP address

IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers.
The four numbers in an IP address are known as ‘octets’. Each of them has eight bit positions. The octets are divided into two sections: Net and Host. The first octet represents Net for identifying the network and the Host contains the last octet. There are five IP classes.
Class A: The class A is used for very large networks. There are 1 to 126 are part of this class. That means there are 126 Class A networks. Class A networks accounts for half of the total available IP addresses.
Class B: It is used for medium size networks. The IP address with a first octet from 128 to 191 is part of this class. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.
Class C: Class C is used for small to middle size networks. IP address with a first octet starts from 192-223. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.
Class D: It has first, second and third bit value as 1 and the fourth bit as 0. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.
Class E: Class E is used for identification purpose. The four bits value is 1. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.


·     Define Subnetting:- 

A subnet describes a set of networked computers which have common IP address routing prefix.


Breaking the networking into smaller and more efficient subnets is known as subnets. Subnetting prevents Ethernet packet collision which has excessive rates in a large network. Routers are used to manage the traffic and constitute borders among subnets.

Subnetting is dividing a network into several subnets.
This is usually done for the following purposes:
  • Reducing network traffic by decreasing the number of broadcasts
  • Exceeding the limitations in a local area network
  • Enabling people to connect to the network remotely without opening the entire network 

DHCP:- Dynamic Host Configuration Protocol :- 

·        Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically. Certainly, using DHCP, the computer will have a different IP address every time it is connected to the network. In some cases the IP address may change even when the computer is in network. This means that DHCP leases out the IP address to the computer for some time. Clear advantage of DHCP is that the software can be used to manage IP address rather than the administrator. 

DHCP vs Static IP:- 

With static IP addressing, addresses are assigned manually, and have to be provisioned carefully so that each device has its own address—with no overlap. When you connect a new device, you would have to select the "manual" configuration option and enter in the IP address, the subnet mask, the default gateway and the DNS server(s). If you understood any of what I just said, you probably have the skills and knowledge necessary to manage static IP addresses on a home network. If it was basically gibberish, you’d probably be more comfortable with DHCP.

DHCP takes all of the manual work out of IP addressing. Generally, the device that's at the "top" of your home network—whether it's a standalone firewall or a router/gateway device or your Control4 home controller—will provide DHCP by default as a service on the network. When DHCP is enabled, a new device connected to the network asks the DHCP server for an address, and the server assigns one from its pool of unused locations. The server itself tracks which addresses are used and which addresses are available, and keeps a record of which addresses have been assigned to the various devices. This ensures that addresses don't conflict with each other. However, it also means that, if a device goes offline, when it reconnects it may not have the same IP address it had before.

What is Network address translation (NAT

It enables us to reuse IP address. For these every computer or device did not have to use unique ip address. 


Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IP’s. NAT can be statically defined or dynamically translate from a pool of addresses. The NAT router is responsible for translating traffic coming and leaving the network. NAT prevents malicious activity initiated by outside hosts from reaching local hosts by being dependent on a machine on the local network to initiate any connection to hosts on the other side of the router.

It is basically Short for Network Address Translation, an Internet standard that enables a local-area network (LAN) to use one set of IP addresses  for internal traffic and a second set of addresses for external traffic. A NAT box located where the LAN meets the Internet makes all necessary IP address translations.

NAT serves three main purposes:

  • Provides a type of firewall by hiding internal IP addresses 
  • Enables a company to use more internal IP addresses. Since they're used internally only, there's no possibility of conflict with IP addresses used by other companies and organizations. 
  • Allows a company to combine multiple ISDN connections into a single Internet connection.

I found a very useful video , where it explained it very easily .






Featured Post

Managing CA Certificates on Red Hat Linux 9: Understanding update-ca-trust extract

  Managing CA Certificates on RHEL9 RHEL8 OracleLinux9 OracleLinux8 In today's digital landscape, securing communications and verifying ...