• Introduction to CentOS and RedHat Linux


    Introduction to CentOS CentOS is the abbreviation of community enterprise operating system. Many people call it community enterprise operating system. No matter what you call it, it is a distribution version of Linux operating system.CentOS is not a new Linux distribution. It seems that everyone has heard of red hat. There are enterprise products in […]

  • Method of configuring iptables firewall under RedHat (CentOS)


    Set up a firewall in Linux. Take CentOS as an example, open the iptables configuration file: vi /etc/sysconfig/iptables Use the / etc / init.d/iptables status command to query whether port 80 is open. If not, you can handle it in two ways: 1. Modify the VI / etc / sysconfig / iptables command to add […]

  • Oracle 11g installation tutorial under RedHat Linux 5.5


    The best way to install Oracle system under Linux is 1G memory, 2G swap space, and at least 4.5g hard disk space. At least the environment is above Linux server release 5.3 For Linux server release 5.1, modify Oracle 10.2g 1、 View Linux version [[email protected] ~]# cat /etc/issueRed Hat Enterprise Linux Server release 5.5 (Tikanga) […]

  • Methods of locking and unlocking software package versions in CentOS and RedHat (details of using Yum versionlock)


    So how to lock a package in a specific version? Now let me introduce a method. Use the yum versionlock command to lock the version. 1. Installation Copy code The code is as follows: # yum install yum-plugin-versionlock.noarch 2. Add lock package Example: Lock Perl package to current version Copy code The code is as […]

  • Red Hat Enterprise update red hat releases RHEL 7.1 download


    Red hat is arguably the most successful enterprise focusing on Linux. Red Hat Enterprise Linux (RHEL) has a high reputation in the industry.Today, the company released the latest version of the release (RHEL 7.1), which includes improved development and deployment tools, enhanced interoperability and objectivity, and brings additional security and performance. Jim Totton, senior vice […]

  • Solution to [errno 5] oserror: [errno 2] on RedHat server


    When configuring the local source of Yum on Red Hat Enterprise Linux server release 5.7, we encountered “[errno 5] oserror: [errno 2] no such file or directory XXX”. It took some time to figure out the cause and effect of the error. It is hereby recorded that: Copy the image of RedHat 5.7 to / […]

  • How to install Gnome graphical desktop to RedHat system


    Although Linux administrators may not need a graphical user interface, users transferred from Microsoft Windows do. For this reason, Linux needs a GUI to make Microsoft Windows users more comfortable. Red Hat Linux provides gnome, the GNU Network Object Model environment. Gnome not only provides high-performance GUI, but also provides high-performance software such as office […]

  • Basic method of configuring local Yum source in RedHat system


    Yu is the abbreviation of yellow dog updater modified. It was originally developed by Terra soft, the developer of yellow dog. It was written in Python. At that time, it was also called yup (yellow dog updater). Later, it was developed by Duke University [email protected] The development team makes improvements, hence the name. The purpose […]

  • Explain some important kernel files commonly used in RedHat system


    In the network, many servers use Linux system. In order to further improve the performance of the server, it may be necessary to recompile the Linux kernel according to the specific hardware and requirements. To compile the Linux kernel, we need to follow the prescribed steps, and several important files are involved in the process […]

  • When VMware installs RedHat Linux system, what should I do if the CD cannot be mounted?


    When using vmware workstation to install RedHat Linux operating system, RedHat Linux will remind us to insert the second or third disc at appropriate time during the installation because there are three image files of the installation program of RedHat Linux. When VMware installs RedHat Linux system, what should I do if the CD cannot […]

  • Methods of repairing potential bash vulnerabilities on RedHat system


    Bash is the software used to control the command prompt of Linux computer. Network security experts say hackers can take full control of the target computer system by exploiting a security vulnerability in bash. Dan Guido, chief executive of trail of bits, a network security company, points out: “compared with heartbleed, the latter only allows […]

  • Basic network connection and setting method on RedHat system


    Before starting the explanation of this chapter, it is specially stated that since there is no need to configure IPv6 in the operation and maintenance work for so many years, we will not explain IPv6 too much here.1、 Linux graphical network configurationThe simplest way to configure networking in Red Hat Linux is to use the […]