Step by Step Red Hat Linux 7.0 installation (64 bit) with screenshots
Here are the step by step screenshot for the installation of Red Hat Enterprise Linux 7 (64 bit). The installation process is not much different as compared to "CentOS 7.0 (64-bit)" which I have...
View ArticleHow to configure and analyze kdump for kernel panic in Red Hat Linux 6
Kdump is a kernel crash dumping mechanism that allows you to save the contents of the system's memory for later analysis. It relies on kexec, which can be used to boot a Linux kernel from the context...
View ArticleWhat is buffers/cache in free command in Linux ?
When we run free command to view the memory usage in Linux we get a similar output as below# free -m total used free shared buffers cachedMem: 1869...
View ArticleHow to check memory utilization for a specific process ?
We have a no. of ways to check the overall memory usage but what if you want to monitor memory usage of some particular process.To show an example I am running screen utility on my machine so lets try...
View ArticleHow to do a case sensitive search inside vi editor in Linux
VI editor can sometimes be very tricky and irritating if you are not fully aware of those small arguments which could make your life much easier while working on the editor. One such thing when are...
View ArticleHow to fix "/usr/bin/ssh-copy-id: ERROR: No identities found"
Error:# ssh-copy-id root@192.168.1.11/usr/bin/ssh-copy-id: ERROR: No identities foundSolution:You will have to manually define the path of the public key using -i switch as shown below# ssh-copy-id...
View ArticleHow to perform a local ssh port forwarding in Linux
SSH supports a variety of ways of moving data across psuedo-VPN tunnel. One of the methods is Port Forwarding which creates a secure connection between a local computer and a remote machine through...
View ArticleHow to delete an iscsi-target from openfiler and Linux
In my last article I had shown you steps to create iscsi-target using openfiler. So in this article I will be showing you step by step method to delete an iscsi-target from openfiler.This is my GUI...
View ArticleHow to configure a Clustered Samba share using ctdb in Red Hat Cluster
As of the Red Hat Enterprise Linux 6.2 release, the Red Hat High Availability Add-On provides support for running Clustered Samba in an active/active configuration.This requires that you install and...
View ArticleHow to configure bridged network in Oracle Virtual Box (Linux)
I have been asked this question multiple times by many users so I guess it is best if I could write a blog on this on different types of network which can be configured inside Virtual Box and most...
View ArticleWhy is sudo command asking for root password in Linux
I have written two blogs earlier to help you understand sudo configuration and its function which you can follow using the below linkHow to configure passwordless sudo for a user in LinuxHow to give...
View Article15 practical examples of rpm command usage in Linux
I have written a blog explaining different fields of an rpm. To understand a rpm and all its fields follow the below linkUnderstanding RPM packageHere I have tried to summarize a list of rpm commands...
View ArticleHow to get the hardware model information in Linux
The below commands are executed in SuSE Enterprise Linux so some of them might not work on other flavors of Linux.Run the below command and scroll a few lines where you should be able to see your...
View ArticleThe best online games that run best on Linux
When the week has been a bit monotonous or you are stuck in bed with the flu, make the most of a night out... by making it a night in. Europalace Casino is the perfect place to have all the fun of a...
View ArticleHow to install MetaTrader 4 on Linux
For years now, the MetaTrader 4 trading platform has been the top Forex platform around. It has perfect functionality, is lightweight, and has the best features.One of its lackings is that there is no...
View ArticleORA-28002: the password will expire within 6 days (certain string)
I have been working in Sql developer for certain time, few days back found new notification/warning windows is popping up with the error message - ORA-28002: the password will expire within 6 days...
View ArticleHow to preserve symbolic link while copying a file in Linux
Below set of commands are executed on Suse Linux Enterprise Server 11 SP 3 operating system,There can be many scenarios of copying symbolic links between different directories, let me try to explain...
View ArticleHow to fix "mountd: refused mount request: unmatched host"
Error:On Client (192.169.32.17)# mount 192.169.32.10:/export/home/deepak /mntmount.nfs: access denied by server while mounting 192.169.32.10:/export/home/deepakOn NFS Server (192.169.32.10)# tail -n 1...
View ArticleHow to configure TFTP server in Linux
About TFTP from wiki pageTrivial File Transfer Protocol (TFTP) is a simple, lockstep, File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its...
View ArticleHow to downgrade HP Emluex CNA NIC card firmware version
This article will guide you with steps used to perform upgrade as well as downgrade of Emulex Converged Network Adapters firmware version running on HP hardwareFor the demonstration of this article I...
View Article