Free Essay

Red Hat

In:

Submitted By helpme23
Words 7097
Pages 29
A famous professor Andrew Tanenbaum developed Minix, a simplified version of UNIX that runs on PC.
Minix is for class teaching only. No intention for commercial use
In Sept 1991, Linus Torvalds, a second year student of Computer Science at the University of Helsinki, developed the preliminary kernel of Linux, known as Linux version 0.0.1
Free software, as defined by the FSF (Free Software Foundation), is a "matter of liberty, not price." To qualify as free software by FSF standards, you must be able to:
Run the program for any purpose you want to, rather than be restricted in what you can use it for.
View the program's source code.
Study the program's source code and modify it if you need to.
Share the program with others.
Improve the program and release those improvements so that others can use them.
Red Hat Linux : One of the original Linux distribution.
The commercial, nonfree version is Red Hat Enterprise Linux, which is aimed at big companies using Linux servers and desktops in a big way. (NJIT)
Free version: Fedora Project.

Debian GNU/Linux : A free software distribution. Popular for use on servers. However, Debian is not what many would consider a distribution for beginners, as it's not designed with ease of use in mind.

SuSE Linux : SuSE was recently purchased by Novell. This distribution is primarily available for pay because it contains many commercial programs, although there's a stripped-down free version that you can download.

Mandrake Linux : Mandrake is perhaps strongest on the desktop. Originally based off of Red Hat Linux.

Gentoo Linux : Gentoo is a specialty distribution meant for programmers.
A runlevel is a software configuration of the system which allows only a selected group of processes to exist
The processes spawned by init for each of these runlevels are defined in the /etc/inittab file
Init can be in one of eight runlevels: 0-6

Runlevel: defines number and type of daemons loaded into memory and executed init daemon responsible for changing runlevels
Often called initstates
Seven standard runlevels runlevel command: displays current and most recent runlevel init command: change OS runlevel telinit command: Alias to init command
Process of creating new user accounts
Add default files to be part of every user’s home directory to /etc/skel directory
Create home directory for all users
Configure default settings for all users
Create groups
Create user account for each person
Create valid password for each user
/etc/passwd file defines user accounts, including:
User name – Comment field
Password – User’s home directory
UID – User’s default shell
GID
vipw command edits /etc/passwd file passwd command defines password
Utilities to create new user accounts
Graphical tools
Command-line utilities system-config-users utility
Red Hat graphical user account creation tool
Information from /etc/passwd file shown in window
Can edit each fields
Edit password information stored in /etc/shadow
User Properties dialog, User Data tab
User name
Full name
Password and confirm password
Home directory
Login shell
User Properties dialog, Account Info tab
Enable account expiration
Lock local password
User Properties dialog, Password Info tab
View when user last changed password
Enable password expiration
Experts recommend changing password every 30 to 60 days
User Properties dialog, Groups tab
Lists groups from /etc/group file
Each user assigned primary group
User private group model
Used by Red Hat Linux and Fedora
User’s primary group has same name as user
Contains only user as member
Create new user system-config-users utility
Add User button
Enter information on dialog
Utility creates home directory based on user name
/etc/login.defs file
Stores settings used to create new users
Comments describe settings
Create new group
Click Add Group button
Enter group name
Delete user
Select user name on Users tab
Click delete button
Some administrators prefer to permanently disable, not delete useradd utility
Create new users
Must be logged in as root
Example: useradd -g sales -c “Raley Solomon" rsolomon
-D option displays the default settings
Edit /etc/default/useradd to change defaults passwd command
Change user’s password
Lock user account: passwd -l thomas
Unlock account: passwd -u Thomas groupadd command
Preferred method for adding new group
Example: groupadd managers usermod command
Modify user account
Uses same options as useradd command groupmod command
Modify group
-g option: change GID
-n option: change name
Directories and files are organized hierarchically
Ability to manipulate directory defined by rights
Superuser: arranges information anywhere
Regular user: is confined to a particular branch
Accessing the Fedora command line interface
Configure the system to open to the command line
Open a terminal window from the GUI
Home directory is starting directory for regular users
Example: /home/User01
Command [options] [parameter1] [parameter2]
[parameter3]

Data streams for ls -l, a sample command
Three methods for executing commands
– Same line, sequential command line processing
• Example: ls –l /etc ; pwd
– Piped, sequential command processing
• Example: ls –l /etc | more
• Pipe symbol pipes output from ls to more
– Batch file sequential processing

Example: ls –l /etc pwd
Use ls command to view list of directories and files
• ls default: display directory with files alpha sorted
• ls command syntax: ls [options] [location]
• Some ls command options
– a: shows hidden files
– l: a longlisting format • A few examples of many useful ls command options
– ls –l /etc/hosts: list details about a file or directory
– ls –S /etc/hosts: change the order of lines in a text file
Use more with ls to page through directories/files
– Example: ls –Rl /etc | more
• Use sort with ls to control order item appears in list
– Example: ls –l /etc | sort –k9 (sort by ninth field in list)
• sort command syntax: sort [options] [files]
• pwd command syntax: pwd [options]
– Displays full path filename of the current directory
• more command syntax: more [options]
Two wildcard characters identify groups of files
– The question mark (?): represents any character
– The asterisk (*), or star: represents any string
• Example with ? wildcard: ls host????
– Lists files consisting of host plus any four characters
– Possible matches: hostuser, hosthome, host1234
• Example using * wildcard: *.*
– Represents all filenames with any extension
Use the cd command to change current directory
– Page definition options are beyond scope of book
• cd command syntax: cd [options] [location path]
Two methods: change absolute path or relative path
• Other directory symbols
– “..” entry: points to the parent directory
• Change the directory with the absolute path method
– Type cd /college/business/accounting
• Refer to the previous directory using the relative path
– Type cd ../../business/accounting
• Back up one subdirectory and move up higher
– Type cd..
Users authorized to create directories with mkdir
– Superuser
– Regular user with write permission in parent directory
• mkdir syntax: mkdir [options] [directory name]
• mkdir command options:
– p: makes parent directories as needed
– v: displays a message for each created directory
• Navigating to arts directory, add printing directory
– cd /college/arts mkdir printing
Ownership permission or superuser logon required
• rmdir command syntax: rmdir [options] directory[s]
• rmdir command options:
– p: tries to remove components in path as needed
• Cannot be used if directories contain files
– v: displays a message for each removed directory
• Navigate to Printing directory, remove component
– cd /college/arts rmdir printing
• Remove full branch with rm command and r or R cp -A command utility that can be used to copy a file, including text and executable program (binary) files is the cp utility
Example:
cp tiles.conf /home/student/tiles1.conf

Tail - A command utility used to view the last ten lines of a file
Top – A command utility used to view the first ten lines of a file
Who – lists users who logged on to a specific terminal
Pwd- displays the pathname of the current working directory
Chmod – change ownership permissions of files and directories
To find files in the terminal

find <start-point> | grep <filename>

or locate if you prefer:

locate | grep <filename>

Each standard user account has a separate home directory under /home/ to store files specific to that user. This contains both their private data files, and the configuration files that define the user settings for each desktop application.
Locations for shared data
/srv/
/var/
/lost+found/
The root account uses the home directory /root/. This ensures that the root account may function normally when the /home/ directory is not accessible. Only store data files and scripts in /root/ if they are for the purposes of system administration. Each administrator should also have a standard user account for their own files.
Removable Storage
/media/
Network Directories
/mnt/
/net/
The connections made with /mnt/ and /net/ may be made available to all users on the system. Connections made with the desktop applications are not attached to the filesystem, and may only be accessed by the user that made those connections.
Location for Software
/bin/
The /usr/ heirarchy (and /usr/local/).
Specify /usr/share/ for shared documents and other resources relating to software.
The /sbin/ directory
The directory /sbin/ contains programs that are used by the system itself. Use the supplied configuration tools to modify your system, rather than the software in /sbin/.
Additional Software
/misc/
/opt/
System Configuration Files
Files for settings that apply to the entire system:
/etc/
Virtual files maintained by the system. These may be read or written to as if they were real files on the drive:
/proc/
/sys/
Virtual files are created on boot
All changes to virtual files are lost when your system reboots. If you wish to automatically change a value in a virtual file when the system starts, refer to Modifying the Startup Process.
Core System Directories
/boot/
/dev/
/lib/
/sbin/
/selinux/
/tmp/
Open a shell….
Type in the following and observe: w date man w (get more information on w command) whatis man whereis csh (lists the path) whoami hostname uname (linux) who (information about current user)

Linux Permissions
Permissions are set for user, group, and others
Each permission is set with a single digit from 0 to 7 based on the combination of permissions read = 4 write = 2 execute = 1
Using CHMOD to set permissions

Finding IP address
Use “uname”
Using grep command (or anything else) you can display the IP address and machine name

Text Editor
VIM – Has two modes: Command Mode Input Mode

Vim command Action :
:e filename Open a new file. You can use the Tab key for automatic file name completion, just like at the shell command prompt.
:w filename Save changes to a file. If you don't specify a file name, Vim saves as the file name you were editing. For saving the file under a different name, specify the file name. :q Quit Vim. If you have unsaved changes, Vim refuses to exit. :q! Exit Vim without saving changes. :wq Write the file and exit.
VIM
Moving around in the file j or Up Arrow Move the cursor up one line. k or Down Arrow Down one line. h or Left Arrow Left one character. l or Right Arrow Right one character. e To the end of a word.
E To the end of a whitespace-delimited word. b To the beginning of a word.
B To the beginning of a whitespace-delimited word. 0 To the beginning of a line.
H To the first line of the screen.
M To the middle line of the screen.
L To the the last line of the screen.
:n Jump to line number n. For example, to jump to line 42, you'd type :42

VIM Insert Mode i Insert before cursor.
I Insert to the start of the current line. a Append after cursor.
A Append to the end of the current line. o Open a new line below and insert.
O Open a new line above and insert.
C Change the rest of the current line. r Overwrite one character. After overwriting the single character, go back to command mode.
R Enter insert mode but replace characters rather than inserting.
The ESC key Exit insert/overwrite mode and go back to command mode.
VIM
x Delete characters under the cursor.
X Delete characters before the cursor. dd or :d Delete the current line.
Scripts
Shell scripts are short programs that are written in a shell programming language and interpreted by a shell process.
A shell is a program that provides the traditional, text-only user interface for Unix-like operating systems. The default shell on Linux is the very commonly used and highly versatile bash.
First Script
The following example, although extremely simple, provides a useful introduction to creating and using shell scripts. The script clears the monitor screen of all previous lines and then writes the text Good morning, world. on it.
All that is necessary to create this script is to open a text editor (but not a word processor), such as gedit or vi, and type the following three lines exactly as shown on a new, blank page:
#!/bin/bash
clear echo "Good morning, world."
Running a Script
After saving this plain text file, with a file name such as morning (or anything else desired), the script is complete and almost ready to run. Scripts are typically run by typing a dot, a forward slash and the file name (with no spaces in between) and then pressing the ENTER key.

./morning
Error Due to permissions
Sometimes an error message will appear on the screen such as bash: ./morning: Permission denied.
This is because the permissions for the file first have to be set to executable. (By default, the permissions for new files are set to read and write only.)
The problem can easily be solved by using the chmod command with its 755 option

chmod 755 morning
How Scripts Work
The first of the three lines tells the operating system what shell to use to interpret the script and the location (i.e., absolute pathname) of the shell. The shell is bash, which is located in the /bin directory (as are all shells); thus the line contains /bin/bash. This instruction is always preceded by a pound sign and an exclamation mark in order to inform the operating system that it is providing the name and location of the shell (or other scripting language).
The second line tells the shell to issue the clear command. This is a very simple command that removes all previous commands and output from the console or terminal window in which the command was issued.
The third line tells the shell to write the phrase Good morning, world. on the screen.
It uses the echo command, which instructs the shell to repeat whatever follows it.
(The quotation marks are not necessary in this case; however, it is good programming practice to use them, and they can make a big difference in more advanced scripts.)
In slightly more technical terms, Good morning, world. is an argument (i.e., input data) that is passed to the echo command.
Redirection
The term redirection encompasses the various ways you can cause the shell to alter where standard input of a command comes from and where standard output goes to. By default the shell associates standard input and standard output of a command with the keyboard and the screen as mentioned earlier.
You can cause the shell to redirect standard input or standard output of any command by associating the input or output with a command or file other than the device file representing the keyboard or the screen. This section demonstrates how to redirect input from and output to ordinary text files and utilities.
Redirecting Standard Output
The redirect output symbol (>) instructs the shell to redirect the output of a command to the specified file instead of to the screen
(Figure 7-6). The format of a command line that redirects output is command [arguments] > filename
Figure 7-6. Redirecting standard output where command is any executable program (such as an application program or a utility), arguments are optional arguments, and filename is the name of the ordinary file the shell redirects the output to.

$ cat > sample.txt
(Figure 7-6). The format of a command line that redirects output is command [arguments] > filename
Figure 7-6. Redirecting standard output where command is any executable program (such as an application program or a utility), arguments are optional arguments, and filename is the name of the ordinary file the shell redirects the output to.

$ cat > sample.txt
Redirecting Standard Input
Just as you can redirect standard output, so you can redirect standard input. The redirect input symbol (<) instructs the shell to redirect a command’s input to come from the specified file instead of from the keyboard (Figure 7-9). The format of a command line that redirects input is command [ arguments] < filename
Figure 7-10 shows cat with its input redirected from the supply_orders file that was created in Figure 7-8 and standard output going to the screen. This setup causes cat to display the sample file on the screen. The system automatically supplies an EOF (end of file) signal at the end of an ordinary file.
Figure 7-10. cat with its input redirected
$ cat < supply_orders
Appending Standard Output to a File
The append output symbol (>>) causes the shell to add new information to the end of a file, leaving any existing information intact. This symbol provides a convenient way of catenating two files into one. The following commands demonstrate the action of the append output symbol.
The second command accomplishes the catenation described in the preceding caution box:

$ cat orange this is orange
$ cat pear >> orange
$ cat orange this is orange this is pear
The shell uses a pipe to connect standard output of one command directly to standard input of another command. A pipe (sometimes referred to as a pipeline) has the same effect as redirecting standard output of one command to a file and then using that file as standard input to another command. A pipe does away with separate commands and the intermediate file. The symbol for a pipe is a vertical bar (|). The syntax of a command line using a pipe is command_a [arguments] | command_b [arguments]
You can use a pipe with any of the Linux utilities that accept input either from a file specified on the command line or from standard input.

$ ls | lpr

This will list all files in the local printer queue.
Network Configuration Files
/etc/resolve.conf-List DNS servers for internet domain name resolution.

/etc/hostsLists hosts to be resolved locally (not by DNS).

/etc/hosts /etc/nsswitch.conf-List order of host name search. Typically look at local files, then NIS server, then DNS server.

/etc/sysconfig/network-Specify network configuration. eg. Static IP, DHCP, NIS, etc.

/etc/sysconfig/network-scripts/ifcfg-device - Specify TCP network information.
/etc/network/interfaces - Specify network configuration and devices. eg. Static IP and info, DHCP, etc.
The easiest way to configure your network connection on Red Hat Linux is to run the 'netconfig' utility.
# netconfig
The netconfig utility will ask you if you would like to set up networking. Push the "Yes" button. (Use the tab key to move between items.) To have your computer configure itself automatically with DHCP simply select the item "Use Dynamic IP configuration" by pressing the space bar when that item is highlighted.
To configure you computer to use a static IP address, tab down the form and fill in the IP address, the Netmask (which will be 255.255.255.0), the Default gateway (which will be 143.229.xxx.1, where xxx is the subnet for your dorm or building), and the Primary Nameserver (which is 143.229.1.6).
To make the changes take effect you need to restart the networking service, with the command:
# service network restart
In Unix you do not need to reboot to change your network configuration. Remember though that you must be the root user to use the commands above. When you are done you should exit the root command shell or log out of the root account. ifconfig You can verify that the IP address and netmask have been set correctly using the ifconfig command:
# ifconfig
This will list the IP address (as "inet addr") and the subnet mask (as "Mask") for the network interface "eth0" (your ethernet card). It will also list other details, including the hardware address of your ethernet card (as "HWaddr"), which is sometimes refered to as the "MAC address". This is an identifier for your ethernet card (like a serial number) and is different from the IP address. (The ifconfig command will also give the status of the "loopback" device ("lo"), which is a simulated network connection from your computer back to itself. The IP address of the loopback device will be 127.0.0.1. You don't need to do anything to this interface.)
Default Route
You can verify that the gateway (default route) is set correctly by giving the route command:
# route -n The default "Destination", which is listed as 0.0.0.0, should have a "Gateway" of 143.229.xxx.1, where xxx the subnet for your dorm or building. The -n "numeric" flag prevents DNS lookup and reports addresses in numeric form.
/etc/sysconfig/network
These changes will go away after the next reboot. You can make permanent changes by editing the appropriate configuration files. Red Hat Linux keeps the network configuration information settings in the file /etc/sysconfig/network.
The file should look something like:
NETWORKING=yes
HOSTNAME=mandalay
BOOTPROTO=static
IPADDR=143.229.29.60 NETMASK=255.255.255.0 GATEWAY=143.229.29.1
The file /etc/sysconfig/network for a static IP address.
/etc/sysconfig/network-scripts
Sometimes some of this information will be recorded in the file ifcfg-eth0 in the directory /etc/sysconfig/network-scripts instead. I f you have more than one Network Interface Card (NIC), as for example a laptop with both a wired and wireless connection, then information for each NIC will appear in separate files in this directory with names of the form ifcfg-ethX for "eth0" and "eth1", etc. For example, to enable DHCP at boot for a wireless card which is "eth1" the file would contain:
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=DHCP
Figure 2: The file /etc/sysconfig/network-scripts/ifcfg-eth1 for a wireless NIC, as in a laptop.
Printer Configuration Tool
Printer Configuration Tool allows users to configure a printer. This tool helps maintain the printer configuration file, print spool directories, print filters, and printer classes.
Red Hat Enterprise Linux 5.8 uses the Common Unix Printing System (CUPS).

Using Printer Configuration Tool requires root privileges. To start the application, select System (on the panel) > Administration > Printing, or type the command system-config-printer at a shell prompt.
Print Queues
The following types of print queues can be configured:
AppSocket/HP JetDirect — a printer connected directly to the network through HP JetDirect or Appsocket interface instead of a computer.
Internet Printing Protocol (IPP) — a printer that can be accessed over a TCP/IP network via the Internet Printing Protocol (for example, a printer attached to another Red Hat Enterprise Linux system running CUPS on the network).
LPD/LPR Host or Printer — a printer attached to a different UNIX system that can be accessed over a TCP/IP network (for example, a printer attached to another Red Hat Enterprise Linux system running LPD on the network).
Networked Windows (SMB) — a printer attached to a different system which is sharing a printer over an SMB network (for example, a printer attached to a Microsoft Windows™ machine).
Networked JetDirect — a printer connected directly to the network through HP JetDirect instead of a computer.
Adding Printers Through Command Line redhat-config-printer-tui --Xadd-local options

Options:
--device=node(Required) The device node to use. For example, /dev/lp0.
--make=make(Required) The IEEE 1284 MANUFACTURER
--model=model(Required) The IEEE 1284 MODEL
--name=name(Optional) The name to be given to the new queue. If one is not given, a name based on the device node (such as "lp0") will be used.
--as-default(Optional) Set this as the default queue.
Restart Print Services
After adding the printer, use the following command to start/restart the printer daemon: service cups restart
Print driver files always end in extension .ppd
Configuring Wireless
You can configure a wireless NIC by using system-config-network or iwconfig
Configuring Network Devices
You can configure network devices in Linux through Network Manager
Configuration Information
Configuration information is stored in

/etc/sysconfig/network

Directory
Configuration of network connections
Configuration of network connections is made through

nm-connection-editor
Network Manager
Configuration of network connections through Network Manager contains the below information:

IP Address
Subnet Mask
Gateway Address
Sendmail Configuration File
The configuration file is responsible for telling sendmail several important things about how it should handle mail: General configuration options, such as queue directory and timeout values
Definitions for each MDA, including pathnames and options
Rulesets for header processing/rewriting, and the "routing table" which determines which MDAs get used for which messages cf files vs .mc files
The /etc/mail/sendmail.cf file was designed to be quickly parsable by sendmail, not to be human-readable, and it's widely considered to be one of the most cryptic things a Unix administrator needs to deal with. So, starting with version 8, a set of macros for the m4 macro language were written to make it much easier to create, modify, and maintain all of the common configurations for the sendmail.cf file.
The file which contains these macros is called a .mc file.

The Structure of a .mc File
The basic structure of a .mc file is as follows: OSTYPE() Your .mc file must start with exactly one OSTYPE() macro, which tells m4 what platform you're running so that it can fetch the appropriate defaults from the cf/ostype/ostype.m4 file. For example, if you say
OSTYPE(linux), m4 will read the file cf/ostype/linux.m4. define() You can use zero or more define() directives to set variables which control the operation of the configuration macros. The syntax is: define(`variable', `value') Normally, both the variable and the value are quoted as shown to prevent their expansion by m4 itself.
FEATURE() Zero or more FEATURE() macros can be used to select which special features your configuration will use or support.
MAILER() One or more MAILER() macros must be used to define which MDAs are used by your configuration. Usually, you only need to define the local MDA and the SMTP MDA, like this: MAILER(smtp) MAILER(local)
Configuration Variables confSMTP_LOGIN_MSG This defines the one-line message which is displayed when a remote MTA connects to sendmail's SMTP port. Variable expansion is done for many variables, including:
$j local hostname
$v version of the sendmail binary
$Z version of the sendmail.cf file
$b current time confMAX_MESSAGE_SIZE This is the maximum message size allowed for local delivery. I recommend setting this to 5242880 (5MB) to avoid mail bombs. confPRIVACY_FLAGS This allows you to set some restrictions on what other users are allowed to find out about sendmail's operation.
Common values are: authwarnings Issue warnings about authenticity of header information. restrictqrun Only allow root to run the mail queue manually. restrictmailq Only allow root to see the contents of the mail queue. noexpn Do not allow the SMTP EXPN command, which allows remote users to see the result of an alias expansion on the local machine. novrfy Do not allow the SMTP VRFY command, which allows remote users to verify the existence of a user account on your machine. Multiple privacy flags can be specified, separated by commas. confQUEUE_LA Load average at which sendmail puts incoming email into the queue rather than attempt to deliver it immediately confREFUSE_LA Load average at which to stop accepting new incoming SMTP connections.
Sendmail
NAME sendmail - an electronic mail transport agent
Sendmail sends a message to one or more recipients, routing the message over whatever networks are necessary. Sendmail does internetwork forwarding as necessary to deliver the message to the correct place.
Sendmail uses port 25 for mail services.
With no flags, sendmail reads its standard input up to an end-of-file or a line consisting only of a single dot and sends a copy of the message found there to all of the addresses listed.
Senmails main configuration file is /etc/mail/sendmail.mc
Dovecot
Overview
Dovecot is an open sourceIMAP andPOP3 email server for Linux/UNIX-like systems, written with security primarily in mind. Dovecot is an excellent choice for both small and large installations. It's fast, simple to set up, requires no special administration and it uses very little memory.
Some of the most notable features of Dovecot include:

Dovecot is among the highest performing IMAP servers while still supporting the standardmbox and Maildir formats. The mailboxes are transparently indexed, which gives Dovecot its good performance while still providing full compatibility with existing mailbox handling tools.
Dovecots main configuration file is /etc/dovecot.dovecot.conf
Dovecot tries to be admin-friendly. Common error messages are made as easily understandable as possible. Any crash, no matter how it happened, is considered a bug that will be fixed.
Dovecot allows mailboxes and their indexes to be modified by multiple computers at the same time, while still performing well. This means that Dovecot works well with clustered filesystems.
Dovecot is easily extensible. Plugins can add new commands, modify existing behavior, add their own data into index files or even add support for new mailbox formats. For example quota and ACL support are completely implemented as plugins
Openssh
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is.
Encryption keys for users connecting to SSH servers are located in ~/.ssh
Directory.
Global configuration files for open ssh are located in /etc/ssh
The OpenSSH suite replaces rlogin and telnet with the ssh program, rcp with scp, and ftp with sftp.
Commands
Scp - scp allows files to be copied to, from, or between different hosts. It uses ssh for data transfer and provides the same authentication and same level of security as ssh.

Examples:
Copy the file "foobar.txt" from a remote host to the local host
$ scp your_username@remotehost.edu:foobar.txt /some/local/directory
Copy the file "foobar.txt" from the local host to a remote host
$ scp foobar.txt your_username@remotehost.edu:/some/remote/directory
Telnet – This command is utilized to connect to remote computers.
Mycomputer#> telnet host.com
The above example would open a telnet session to the domain host.com.
SSH
1. SSH Client Version:
Sometimes it may be necessary to identify the SSH client that you are currently running and it’s corresponding version number, which can be identified as shown below. Please note that Linux comes with OpenSSH.
$ ssh -V
OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003
$ ssh -V
Login to remote host:
The First time when you login to the remotehost from a localhost, it will display the host key not found message and you can give “yes” to continue. The host key of the remote host will be added under .ssh2/hostkeys directory of your home directory, as shown below. localhost$ ssh -l jsmith remotehost.example.com
Host key not found from database.
Key fingerprint: xabie-dezbc-manud-bartd-satsy-limit-nexiu-jambl-title-jarde-tuxum
You can get a public key’s fingerprint by running % ssh-keygen -F publickey.pub on the keyfile. Are you sure you want to continue connecting (yes/no)? yes
The Second time when you login to the remote host from the localhost, it will prompt only for the password as the remote host key is already added to the known hosts list of the ssh client. localhost$ ssh -l jsmith remotehost.example.com jsmith@remotehost.example.com password: remotehost.example.com$ X11 forwarding
To run graphical programs through a SSH connection you can enable X11 forwarding.
To use the forwarding, log on to your server through ssh:
$ ssh -X -p port user@server-address
Installing and Removing packages with YUM
Yum stands for Yellowdog Updater Modified
To install a package, do ‘yum install packagename’. This will also identify the dependencies automatically and install them.
The following example installs postgresql package
# yum install postgresql.x86_64 Resolving Dependencies Install 2 Package(s) Is this ok [y/N]: y Package(s) data still to download: 3.0 M (1/2): postgresql-9.0.4-5.fc15.x86_64.rpm | 2.8 MB 00:11 (2/2): postgresql-libs-9.0.4-5.fc15.x86_64.rpm | 203 kB 00:00 ------------------------------------------------------------------ Total 241 kB/s | 3.0 MB 00:12 Running Transaction Installing : postgresql-libs-9.0.4-5.fc15.x86_64 1/2 Installing : postgresql-9.0.4-5.fc15.x86_64 2/2 Complete!
By default ‘yum install’, will prompt you to accept or decline before installing the packages. If you want yum to install automatically without prompting, use -y option as shown below.
# yum -y install postgresql.x86_64
To remove a package (along with all its dependencies), use ‘yum remove package’ as shown below.
# yum remove postgresql.x86_64

Resolving Dependencies ---> Package postgresql.x86_64 0:9.0.4-5.fc15 will be erased Is this ok [y/N]: y Running Transaction Erasing : postgresql-9.0.4-5.fc15.x86_64 1/1 Removed: postgresql.x86_64 0:9.0.4-5.fc15 Complete!
If you have a older version of a package, use ‘yum update package’ to upgrade it to the latest current version. This will also identify and install all required dependencies.
# yum update postgresql.x86_64
If you don’t know the exact package name to be installed, use ‘yum search keyword’, which will search all the packages that matches the ‘keyword’ and display it.

The following examples searches the yum repository for all the packages that matches the keyword ‘firefox’ and lists the available packages.

# yum search firefox Loaded plugins: langpacks, presto, refresh-packagekit ============== N/S Matched: firefox ====================== firefox.x86_64 : Mozilla Firefox Web browser gnome-do-plugins-firefox.x86_64 : gnome-do-plugins for firefox mozilla-firetray-firefox.x86_64 : System tray extension for firefox mozilla-adblockplus.noarch : Adblocking extension for Mozilla Firefox mozilla-noscript.noarch : JavaScript white list extension for Mozilla Firefox Name and summary matches only, use "search all" for everything.
Display additional information about a package using yum info

Once you search for a package using yum search, you can use ‘yum info package’ to view additional information about the package.
The following examples displays additional information about the samba-common package.

# yum info samba-common.i686
Loaded plugins: langpacks, presto, refresh-packagekit Available Packages Name : samba-common Arch : i686 Epoch : 1 Version : 3.5.11 Release : 71.fc15.1 Size : 9.9 M
Repo : updates Summary : Files used by both Samba servers and clients URL : http://www.samba.org/
License : GPLv3+ and LGPLv3+
Description : Samba-common provides files necessary for both the server and client : packages of Samba
View all available packages using yum list
The following command will list all the packages available in the yum database.

# yum list | less
List only the installed packages using yum list installed
To view all the packages that are installed on your system, execute the following yum command.

# yum list installed | less
All yum commands goes against one or more yum repositories. To view all the yum repositories that are configured in your system, do ‘yum repolist’ as shown below.
The following will display only the enabled repositories.

# yum repolist repo id repo name status fedora Fedora 15 - x86_64 24,085 updates Fedora 15 - x86_64 5,612
Execute yum commands interactively using Yum Shell

Yum provides the interactive shell to run multiple commands as shown below.

# yum shell
Setting up Yum Shell > info samba.x86_64 Available Packages Name : samba Arch : x86_64 Epoch : 1 Version : 3.5.11 Release : 71.fc15.1 Size : 4.6 M Repo : updates Summary : Server and Client software to interoperate with Windows machines URL : http://www.samba.org/ License : GPLv3+ and LGPLv3+ Description : : Samba is the suite of programs by which a lot of PC-related : machines share files, printers, and other information (such as : lists of available files and printers). The Windows NT, OS/2, and : Linux operating systems support this natively, and add-on packages : can enable the same thing for DOS, Windows, VMS, UNIX of all : kinds, MVS, and more. This package provides an SMB/CIFS server : that can be used to provide network services to SMB/CIFS clients. : Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT : need the NetBEUI (Microsoft Raw NetBIOS frame) protocol. > yum.conf - Configuration file for yum

Description
Yum uses a configuration file at /etc/yum.conf.
Additional configuration files are also read from the directories set by the reposdir option (default is '/etc/yum.repos.d').

Parameters
There are two types of sections in the yum configuration file(s): main and repository. Main defines all global configuration options. There should be only one main section. The repository section(s) define the configuration for each repository/server. There should be one or more repository sections.
Name : wget
Product : Fedora 15 Version : 1.12 Release : 4.fc15
URL : http://www.gnu.org/software/wget/
Summary : A utility for retrieving files using the HTTP or FTP protocols

Description : GNU Wget is a file retrieval utility which can use either the HTTP or FTP protocols. Wget features include the ability to work in the background while you are logged out, recursive retrieval of directories, file name wildcard matching, remote file timestamp storage and comparison, use of Rest with FTP servers and Range with HTTP servers to retrieve files over slow or unstable connections, support for Proxy servers, and configurability.

This update can be installed with the "yum" update program.
Use su -c 'yum update wget' at the command line.
RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.

RPM stands for Red Hat Package Manager.

With root privilege, you can use the rpm command with appropriate options to manage the RPM software packages
Installing a RPM package Using rpm –ivh

RPM filename has packagename, version, release and architecture name.

For example, In the MySQL-client-3.23.57-1.i386.rpm file:

MySQL-client – Package Name
3.23.57 – Version
1 – Release i386 – Architecture

When you install a RPM, it checks whether your system is suitable for the software the RPM package contains, figures out where to install the files located inside the rpm package, installs them on your system, and adds that piece of software into its database of installed RPM packages
Installing a RPM package Using rpm –ivh

RPM filename has packagename, version, release and architecture name.

For example, In the MySQL-client-3.23.57-1.i386.rpm file:

MySQL-client – Package Name
3.23.57 – Version
1 – Release i386 – Architecture

When you install a RPM, it checks whether your system is suitable for the software the RPM package contains, figures out where to install the files located inside the rpm package, installs them on your system, and adds that piece of software into its database of installed RPM packages. rpm command and options

-i : install a package
-v : verbose
-h : print hash marks as the package archive is unpacked.

The following rpm command installs Mysql client package.
# rpm -ivh MySQL-client-3.23.57-1.i386.rpm Preparing... ########################################## [100%] 1:MySQL-client ################################### [100%] Query all the RPM Packages using rpm –qa You can use rpm command to query all the packages installed in your system. # rpm -qa cdrecord-2.01-10.7.el5 bluez-libs-3.7-1.1 setarch-2.0-1.1 . . -q query operation -a queries all installed packages To identify whether a particular rpm package is installed on your system, combine rpm and grep command as shown below. Following command checks whether cdrecord package is installed on your system. # rpm -qa | grep 'cdrecord' Query a Particular RPM Package using rpm –q The above example lists all currently installed package. After installation of a package to check the installation, you can query a particular package and verify as shown below. # rpm -q MySQL-client MySQL-client-3.23.57-1 # rpm -q MySQL package MySQL is not installed Note: To query a package, you should specify the exact package name. If the package name is incorrect, then rpm command will report that the package is not installed. Which RPM package does a file belong to? – Use rpm –qf Let us say, you have list of files and you would want to know which package owns all these files. rpm command has options to achieve this. The following example shows that /usr/bin/mysqlaccess file is part of the MySQL-client-3.23.57-1 rpm. # rpm -qf /usr/bin/mysqlaccess MySQL-client-3.23.57-1

-f : file name Locate documentation of a package that owns file using rpm –qdf Use the following to know the list of documentations, for a package that owns a file. The following command, gives the location of all the manual pages related to mysql package. # rpm -qdf /usr/bin/mysqlaccess /usr/share/man/man1/mysql.1.gz /usr/share/man/man1/mysqlaccess.1.gz /usr/share/man/man1/mysqladmin.1.gz /usr/share/man/man1/mysqldump.1.gz /usr/share/man/man1/mysqlshow.1.gz

-d : refers documentation. Information about Installed RPM Package using rpm -qi rpm command provides a lot of information about an installed pacakge using rpm -qi as shown below: # rpm -qi MySQL-client Name : MySQL-client Relocations: (not relocatable) Version : 3.23.57 Vendor: MySQL AB Release : 1 Build Date: Mon 09 Jun 2003 11:08:28 PM CEST Install Date: Mon 06 Feb 2010 03:19:16 AM PST Build Host: build.mysql.com Group : Applications/Databases Source RPM: MySQL-3.23.57-1.src.rpm Size : 5305109 License: GPL / LGPL Signature : (none) Packager : Lenz Grimmer URL : http://www.mysql.com/ Summary : MySQL - Client Description : This package contains the standard MySQL clients. Upgrading a RPM Package using rpm –Uvh Upgrading a package is similar to installing one, but RPM automatically un-installs existing versions of the package before installing the new one. If an old version of the package is not found, the upgrade option will still install it. # rpm -Uvh MySQL-client-3.23.57-1.i386.rpm Preparing... ########################################## [100%] 1:MySQL-client ################################### [100%]

Similar Documents

Free Essay

The Red Hat

...The Red Hat Arnetia Lomba Ashford University ENG125 Instructor- Mr. Cooper 9/2/14 The Red Hat This short story I had chosen for this assignment is the “The Red Hat”, by Rachel Hadas. Do you know what it's like to send your child off to school for the first time? Remembering how you felt when this happened, your connection to the emotions that Rachel Hadas, poet and former professor at Rutgers University, packs into "The Red Hat" will be instantaneous. Her story captures the anxiety and disequilibrium parents feel when watching their young children drawn away from them to enter school and a world away from home. When the watching parent is described in the story of “The Red Hat” as one whose "heart stretches, elastic in its love and fear”, you can feel those emotions because you have experienced them. Although no one has to explain what "wavering in the whirlpools of change" means you have lived through that uncomfortable experience when home seems strangely empty, routine is broken, and you are forced to accept that your child will not always be with you The main themes that I analyzed was: independence, change and letting go. In this poem I found that independence was a way for parents to let their son walk to school alone when he was clenching to their hands not too long ago, “Where two weeks ago, holding a hand, he'd dawdle, dreamy, slow, he now is hustled forward by the pull of something far more powerful than school,” (Hadas 1994) .During the short story we understand...

Words: 594 - Pages: 3

Premium Essay

Red Hunting Hat

...Catcher in the Rye, the red hunting hat serves as the most important symbol in the novel, which portrays Holden’s constant feelings of alienation, innocence, and protection. By wearing the red hunting hat, the protagonist alienates himself from society and his fear of the phony adult world. When he first purchased the...

Words: 1165 - Pages: 5

Free Essay

Hands on Project 2-1

...1. a. You can, but you should really install the latest and the current Fedora Core release. b. The Fedora official web page: http://fedoraproject.org/ c.http://www.linuxquestions.org/questions/fedora-installation-39/red-hat-linux-fedora-core-2-installation-364623/ http://www.linuxquestions.org/ 2. a. * Linux treats all hardware as devices, but interacts differently with different devices. Storage capacity on a computer is measured in bytes. A byte is composed of 8 bits and can store one character. Computers are capable of storing many characters, and storage is typically determined in megabytes (MB), 1,048,576 bytes, and gigabytes (GB), 1024 MB. * Many companies do not provide device drivers that support Linux. Instead, they rely on the free software development community to develop the appropriate drivers. For this reason, the newer a hardware device is, the less likely it is to be supported. * Linux OSes have a much lower threshold than Microsoft's Windows 7 and Windows 8 and Apples's Mac OS X. So system resources are less of an issue than system compatibility. That means you can run the latest Linux OS without having to buy a more expensive new computer. b. Unsupported drivers and lack of applications for a particular Linux distribution. c. * Samba Server - OpenLDAP Linux Packages * Processor: Dual core 3.4Ghz …To handle the workload of multiple user file sharing speed * RAM:,2GB of DDR2 dual channel RAM…To allow for faster data retrieval ...

Words: 374 - Pages: 2

Free Essay

Cis 206 Slingshot Academy / Tutorialrank.Com

...CIS 206 All iLabs: Devry University (DEVRY) For more course tutorials visit www.tutorialrank.com CIS 206 All iLabs: Devry University ----------------------------------------------------------- CIS 206 Case Study 2-3 Discussing the Functions of an Operating System (DEVRY) For more course tutorials visit www.tutorialrank.com You have been selected to present a short talk on the functions of an operating system for the weekly tech meeting. To support your talk, you must prepare a handout for the attendees. The handout should summarize the information that you have learned about this topic. ----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit www.tutorialrank.com You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit www.tutorialrank.com Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to prepare...

Words: 3261 - Pages: 14

Free Essay

Rhel Licensing

...red HAt enterprise LinuX subscription Guide subscription Guide Table of ConTenTs Introduction How IT organizations benefit from subscriptions What is included in your Red Hat subscription? Support for the production environment Subscription packaging model Assembling your subscription order Sample worksheet 1: Provisioning physical servers Sample worksheet 2: Adding guests to a virtual environment Sample worksheet 3: Setting up a virtual environment Subscription scenarios and recommendations Physical production environment Sample worksheet 4: Setting up a physical, mission-critical production environment Virtual production environment Sample worksheet 5: Calculating subscriptions for guests Sample worksheet 6: Calculating subscriptions for Red Hat Enterprise Linux on virtual environments Open hybrid cloud Sample worksheet 7: Calculating subscriptions for a private cloud Public cloud access subscriptions Sample worksheet 8: Calculating subscriptions for a public cloud Disaster recovery Development environment Desktops and workstations Managing subscriptions Renewing subscriptions Subscription terms facebook.com/redhatinc @redhatnews linkedin.com/company/red-hat 2 3 3 5 6 8 9 9 9 10 10 11 11 12 13 13 14 14 14 14 15 15 16 17 17 redhat.com System coverage Support services levels Proper use of subscriptions and services Next steps Registering on the Red Hat Customer Portal Activating subscriptions Downloading software Entitling subscriptions Red Hat Enterprise Linux...

Words: 8641 - Pages: 35

Premium Essay

Red Hunting Hat

...and had to suffer because of this. Holden’s red hunting hat in J.D. Salinger’s novel The Catcher in the Rye is used to symbolize Holden’s individuality and true self that Holden only shows in isolation. This red hunting hat is significant in showing Holden’s self-confidence throughout his four day trek. Holden is only really able to express and show his true self in solitary because of the protection it offers from the world. An example of this is when Holden gives this cherished item...

Words: 888 - Pages: 4

Free Essay

Differences Between Ubuntu and Fedora Linux Operating Systems

...Ubuntu is the most popular Linux distribution, Fedora is the fourth most popular. Fedora is based on Red Hat Linux and uses the RPM package manager while Ubuntu is based on Debian and uses APT. Both distributions release a new version every 6 months but there's a difference in their long term support models, Ubuntu offers support for 18 months after a version is released and also releases long term support versions every two years that are supported for 5 years. Fedora offers a shorter support period of only 13 months. Fedora’s default desktop is GNOME 3.2.1 and requires 3D capable graphics cards. Ubuntu’s default desktop is unity, which is available in 2D and 3D and uses a standard GNOME based interface that is designed to be a universal interface for desktops, tablets and smartphones. Fedora is leaned more towards developers and testing software where as ubuntu is leaned more towards the average user and stable software. According to online surveys Ubuntu is the most popular Linux distribution. The latest version of Ubuntu was downloaded 81,063 from CNet. Fedora is now downloaded from its own website, an earlier edition saw 10,000 downloads in the first 24 hours after release. Different hardware can affect the comparative performance of Fedora and Ubuntu. Some benchmark tests suggest that Ubuntu boots faster while Fedora is faster to shut down. Fedora won more of these tests than Ubuntu, but many of these were practical ties in performance. Under Ubuntu, software management...

Words: 340 - Pages: 2

Free Essay

Amazonsoftware

...Amazon.com Software Platform: Amazon uses a customer tracking system, and if a cookie finds your hard drive, you will start seeing recommendations from your prior purchases. Amazon uses Linux, which offers data recovery tools and has business quality software to work with documents, internet, and networking or multimedia and graphics. It could replace Windows XP but is not a clone of Windows. Oracle is a database designed for the Cloud and is an efficient way of using IT Resources while it continues to improve the user's service levels and can reduce the expenses for IT Specialists. C++ is a collection of commands which will tell the computer to do "something". The collections are codes, and they are either functions or keywords. The keywords are used to build the language; while the functions are simpler tasks that with every C++ program having one service and the main program because it is always used first when a program's executed. Perl Mason is the framework for generating dynamic text and is very useful for creating sophisticated websites. Mason is operated by embedding Perl into text and is popular for creating a web page. Java is the source of most application networked, it is implemental in delivering embedded and mobile apps, games, and web-based content and enterprise software. Java enables you to develop efficiently, deploy and use apps and services. Businesses use it for providing more services and boosts productivity and communication. Java will also allow developers...

Words: 539 - Pages: 3

Free Essay

Linux Introduction an Basics

...names, and which do I choose?” You may have heard names like Red Hat, Fedora, Debian, Ubuntu Distributions differ in several ways, and three of the most important are: ► ► ► Purpose Configuration and packaging Support model What’s a kernel? ♦ As you already know from the Operating Systems course ► the kernel is the core of all computer operating systems ► is usually the layer that allows the operating system to interact with the hardware in your computer ♦ The kernel contains software that allows you to make uniform use of ► hard disk drives, ► network cards, ► RAM, ► and other hardware components. ♦ In the Linux world, the kernel is based on code originally developed by Linux’s founder, Finnish developer Linus Torvalds. Back to distributions – Purpose, Configuration, Support ♦ Purpose ► Different distributions are often designed for different purposes and provide different user experiences. ► Some distributions are designed as servers, others as desktops, and some are designed to perform particular functions, for example, as embedded systems. ► The majority of Linux installations still tend to be servers. ♦ Configuration ► configuration settings and files in the usual locations, but not a rule ► installing and updating applications ♦ Support models ► Debian, CentOS, and Fedora - community of volunteers ► Red Hat Enterprise Linux and Ubuntu - a commercial vendor Popular Linux Distributions ♦ Red Hat Enterprise...

Words: 1486 - Pages: 6

Free Essay

Linux Security Technologies

...Vepstas). When a user first approaches Linux it looks similar to what a windows operating system would resemble. With Linux a user has the ability to access every file within the operating system through the use of a terminal or command prompt. Through the use of Linux programming potential threats can gain access to you file system and everything housed within it. Linux is free software that comes with many great security features that any user or administrator greater access and control over the system. The choice can be a bit much for most, but we will discuss a few of these choices here. Security-Enhanced Linux also known as SELinux is a security program that was developed in partner by the National Security Agency or NSA and Red Hat Developers (“Fedora Project”). So what exactly is it that SELinux does? SELinux was designed so that the Administrator could enforce policies that will limit what a user or particular program...

Words: 1082 - Pages: 5

Free Essay

Computer Analysis

...Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition 1.4 Author Author Author Author Author Author Copyright © 2009 Red Hat, Inc. Copyright © 2009 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. All other trademarks are the property of their respective owners...

Words: 26838 - Pages: 108

Free Essay

Jboss Interview Question

...JBOSS INTERVIEW QUESTIONS Q:How can you start a JTA transaction from a Servlet deployed on JBoss ? A: JBoss registers in the JNDI tree a JTA UserTransaction Object which can be user to manage a distributed transaction Q:What do you need to set-up a cluster with JBoss ? A: Basically starting JBoss with the “all” configuration contains everything needed for clustering: It has all the libraries for clustering: JGroups.jar, jboss-cache.jar Clustered beans (cluster-service.xml) HA-JNDI HTTP session replications (tc5-cluster-service.xml) Farming HA-JMS Q:Which component handles cluster communication in JBoss ? A: The JGroups framework provides services to enable peer-to-peer communications between nodes in a cluster. It is built on top a stack of network communication protocols that provide transport, discovery, reliability and failure detection, and cluster membership management services.    Q:Is it possible to put a JBoss server instance into multiple cluster at the same time ? A: It is technically possible to put a JBoss server instance into multiple clusters at the same time, this practice is generally not recommended, as it increases the management complexity. Q:What's jBoss cache in short ? A: JBossCache enables easy distribution of datasets across your computing environments. It is based on JGroups and enables clustering and high availability of that data. You may choose to distribute the data with JBoss Messaging to move it where it is needed for computation...

Words: 650 - Pages: 3

Free Essay

Open Source Software

...OPEN SOURCE SOFTWARE What are reasons for business to use open source software? With the current economy difficulties, companies are trying to find areas in their businesses where they can save money. Many companies are having no choice but to let people go. Some businesses try to avoid lay-offs and instead are looking in other areas to save money. One of the areas is, of course, the IT department; software application acquisition is an area that might lead to a big money savings. Even in financially difficulties times, businesses want or need to improve their application environment. Sometimes it might even be necessary to invest in the IT infrastructure for long-term savings, which may result in the company not needing to close their doors. But many business owners or CEO’s will question if open source software is ready for business. This research paper intends to answer this question. The best reason to use open source software in a business environment is cost savings. This gives the business freedom to use software and change the source code in other words, modify how the software application is used, as it is needed. Open source removes the need for dependence on single vendor solutions and it provides very high quality applications and very good support. To understand open source software it is important to know what open source is, and what the meaning of open source software is. This research paper will also show where open source came from; the history of open...

Words: 2520 - Pages: 11

Free Essay

Red Hat Linux Server

...server platform is Red Hat Enterprise Linux. Red Hat Linux has been a major player since 1993 starting as desktop version of Linux. In 2003, Red Hat Linux was changed to Red Hat Enterprise Linux which included more versions, including multiple server variants. A typical Linux package is comprised of a Linux kernel, possibly a GUI with window manager and a desktop environment, and other additional software. The Linux kernel is based off the Unix kernel and system originally developed in 1969 by a group of AT&T employees at Bell Labs. The Linux kernel was not developed until 1991 and is written in a version of the C programming language supported by GNU Compiler Collection. Version 3.0 of the Linux Kernel released on 2011, with no major changes initially from past versions but was built for the future. With the Linux kernel being open-source, security is a much criticized topic in relation to the Linux kernel, because a large number of bugs in the kernel can be potential security flaws, whether they allow privilege escalation or create denial-of-service attacks. Over the years, Red Hat Enterprise Linux has had numerous such flaws that were found and fixed in Red Hat’s version of the Linux kernel. New security features are continuously implemented to address computer insecurity issues in the Linux kernel. Although the creator of the Linux kernel, Linus Torvalds says he personally consider security bugs to be just 'normal bugs'. The current version Red Hat Enterprise Linux...

Words: 368 - Pages: 2

Premium Essay

Essay On Red Hunting Hat

...The red hunting hat will never hold the “downpour”. The only way to deal with it is to take the hat off and enjoy in the rain. The Catcher in the Rye by J.D Salinger used tone of first person to describe the characteristic story vividly. The main character Holden favors in wearing the red hunting hat everywhere as he goes. This red hunting hat is not only a decoration or a protection against coldness but also a symbol to portray Holden’s change of identities from his rebellious at school to his coward in escaping and finally to his realization of the reality. In J.D Salinger’s novel The Catcher in the Rye, the red hunting hat reveals Holden’s growth and acceptance of taking responsibility for his own life. The red hunting hat Holden wears exposes his rebellious act of refusal and resistance...

Words: 790 - Pages: 4