Tags » RedHat

Redhat's Maps of the Catacombs lvl 1+2

Catacombs map level 1

Catacombs map level 2

So mapping the catacombs was a bit awkward, but I managed to map out the first 2 levels of the catacombs. 29 more words

Ultimate Quest

Linux Access Control lists (ACL)

Access lists are used to give more granular control of permissions to files and folders than traditional Unix permissions.

These have a ridged Owner/primarygroup/everyone else. 75 more words

Linux

Extending EXT4 partitions

Note you need to use cfdisk. Extending on fdisk is not supported.

Ulitmate goal is to change the end section of the partition. nothing else gets changed. 100 more words

Linux

Using setgid

Wikipedia has a good article on this:

setuid and setgid (short for “set user ID upon execution” and “set group ID upon execution”, respectively)

access rights flags that allow users to run an executable with the permissions of the executable’s owner or group respectively and to change behaviour in directories. 

210 more words
Linux

How to Encrpt a Drive in Linux

1. Format the device with Luksformat so we can use the device.

$sudo cryptsetup luksFormat /dev/sdd

 

2 Set up device mapper.  Luks will handle the encryption and decryption.

161 more words
Linux

Mounting Remote Volumes and Editing /etc/fstab

$sudo mount -t cifs -o username=username,password=Password username= 192.168.1.102/test / /mnt/folder

-t = type

cifs says we are mounting across the network. (Common internet file system)

84 more words
Linux

Logical Volumes in Linux

Previously we created Physical volumes here

Logical volumes are easier to manipulate and we can add new disks and partitions.

1. Create Volume group

$sudo vgcrreate testvg /dev/sdb /dev/sdc… 99 more words

Linux