Monday, March 11, 2019

IPtables VS TCPwrapper VS SSHD config VS /etc/security/access.conf VS PAM

Q.
In how many ways, you can restrict a user to accesss a linux system ?
In how many ways, you can restrict an IP to accesss a linux system ?

Solution:
1. Using IPtables
2. Using TCPwrapper
3. SSH conf file
4. /etc/security/access.conf file


Tuesday, December 19, 2017

Updating Linux system to a specific release instead of the highest available version

System update to a specific release rather than upgrading it to the highest version:

GPT partitioning steps

Steps of creating the GPT partitioning:

Mounting Windows share on Linux system

Steps to share the Windows shared partitions to a Linux system:

Prechecks one-line script to take OS configuration file backup for manual patching in Linux

One-line script to collect Linux OS important configuration details:

Issue with Networker service not able to start in RHEL

Basic steps to solve the networker backup service starting issue in Linux

Hyperic installation issue in Linux || Error: /tmp/agent.encrypt.lock is locked. can't continue.

Solving hyperic monitoring tool installation issue: