Essentials System Admin Tools

Red Hat Linux Essentials More on User, Group, Permission, Filesystem and System Admin Tools
10 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$49.99
List Price:  $69.99
You save:  $20
€46.74
List Price:  €65.44
You save:  €18.70
£40.02
List Price:  £56.04
You save:  £16.01
CA$68.38
List Price:  CA$95.74
You save:  CA$27.36
A$76.50
List Price:  A$107.11
You save:  A$30.60
S$68.11
List Price:  S$95.36
You save:  S$27.25
HK$391.33
List Price:  HK$547.90
You save:  HK$156.56
CHF 45.73
List Price:  CHF 64.03
You save:  CHF 18.29
NOK kr551.82
List Price:  NOK kr772.60
You save:  NOK kr220.77
DKK kr348.47
List Price:  DKK kr487.88
You save:  DKK kr139.41
NZ$84.17
List Price:  NZ$117.84
You save:  NZ$33.67
د.إ183.60
List Price:  د.إ257.06
You save:  د.إ73.45
৳5,499.99
List Price:  ৳7,700.43
You save:  ৳2,200.43
₹4,169.28
List Price:  ₹5,837.33
You save:  ₹1,668.04
RM238.42
List Price:  RM333.81
You save:  RM95.39
₦66,060.50
List Price:  ₦92,489.99
You save:  ₦26,429.48
₨13,909.47
List Price:  ₨19,474.37
You save:  ₨5,564.90
฿1,848.90
List Price:  ฿2,588.61
You save:  ฿739.70
₺1,625.07
List Price:  ₺2,275.23
You save:  ₺650.15
B$255.76
List Price:  B$358.08
You save:  B$102.32
R937.79
List Price:  R1,312.98
You save:  R375.19
Лв91.35
List Price:  Лв127.91
You save:  Лв36.55
₩68,890.62
List Price:  ₩96,452.39
You save:  ₩27,561.76
₪191.22
List Price:  ₪267.73
You save:  ₪76.50
₱2,881.72
List Price:  ₱4,034.64
You save:  ₱1,152.92
¥7,903.16
List Price:  ¥11,065.06
You save:  ¥3,161.90
MX$857.83
List Price:  MX$1,201.03
You save:  MX$343.20
QR182.17
List Price:  QR255.05
You save:  QR72.88
P689.81
List Price:  P965.79
You save:  P275.98
KSh6,639.79
List Price:  KSh9,296.24
You save:  KSh2,656.45
E£2,392.59
List Price:  E£3,349.82
You save:  E£957.23
ብር2,846.33
List Price:  ብር3,985.10
You save:  ብር1,138.76
Kz41,694.65
List Price:  Kz58,375.85
You save:  Kz16,681.20
CLP$47,408.51
List Price:  CLP$66,375.71
You save:  CLP$18,967.20
CN¥362.20
List Price:  CN¥507.11
You save:  CN¥144.91
RD$2,937.78
List Price:  RD$4,113.13
You save:  RD$1,175.34
DA6,708.56
List Price:  DA9,392.53
You save:  DA2,683.96
FJ$113.10
List Price:  FJ$158.35
You save:  FJ$45.25
Q388.59
List Price:  Q544.06
You save:  Q155.47
GY$10,484.28
List Price:  GY$14,678.83
You save:  GY$4,194.55
ISK kr7,026.59
List Price:  ISK kr9,837.79
You save:  ISK kr2,811.20
DH506.20
List Price:  DH708.72
You save:  DH202.52
L890.49
List Price:  L1,246.75
You save:  L356.26
ден2,874.95
List Price:  ден4,025.16
You save:  ден1,150.21
MOP$404.09
List Price:  MOP$565.76
You save:  MOP$161.67
N$957.24
List Price:  N$1,340.22
You save:  N$382.97
C$1,844.23
List Price:  C$2,582.07
You save:  C$737.84
रु6,681.04
List Price:  रु9,353.99
You save:  रु2,672.95
S/188.25
List Price:  S/263.57
You save:  S/75.31
K193.43
List Price:  K270.82
You save:  K77.39
SAR187.48
List Price:  SAR262.50
You save:  SAR75.01
ZK1,328
List Price:  ZK1,859.31
You save:  ZK531.30
L232.80
List Price:  L325.94
You save:  L93.14
Kč1,174.50
List Price:  Kč1,644.39
You save:  Kč469.89
Ft18,370.82
List Price:  Ft25,720.62
You save:  Ft7,349.80
SEK kr544.35
List Price:  SEK kr762.14
You save:  SEK kr217.78
ARS$43,693.47
List Price:  ARS$61,174.36
You save:  ARS$17,480.88
Bs347.54
List Price:  Bs486.59
You save:  Bs139.04
COP$198,223.63
List Price:  COP$277,528.94
You save:  COP$79,305.31
₡25,122.12
List Price:  ₡35,172.98
You save:  ₡10,050.86
L1,237.47
List Price:  L1,732.56
You save:  L495.08
₲372,019.98
List Price:  ₲520,857.74
You save:  ₲148,837.76
$U1,930.85
List Price:  $U2,703.34
You save:  $U772.49
zł201.68
List Price:  zł282.38
You save:  zł80.69
Already have an account? Log In

Transcript

Friends now we have reached in the last theoretical part of Red Hat Enterprise Linux essentials. Here we are going to learn about essential system admin tools and finish our journey with our ATL essentials. So, there are different tools that you can use on average here for various purposes. You can access the installer or retail installer with graphical reinstallation or default installation type. You can switch to useful there are useful features like low resolution for low risk resolution escaped DDC or VNC based installation where you can provide VNC password and netmask with network parameters You can install graphic card, text based installation or serial installation of other devices. When you boot your own OS, the post installation configuration allows you to configure different aspects like a dumb firewall, and security and as line x along with a G y X Window System if necessary if you want to change your default genome to kte or install any other gi X Window tool, you can do so by configuring X Window System.

You can say set a date and time any anywhere after installation during installation and any time in between. You can register with our Archer Red Hat network and get updated RPMs that is redhead package management systems. You can create a user account Configure different things, hardware devices, you can install additional RPMs or read a documentation from CD ROM or pendrive ISO device or any other means, you can manage various services that is a graphical services or other services, the graphical mode to access that services system config services, which could be found easily in application and the command line interface for service management would be located in s beam service and as when ch k config. You can manage different software's on Red Hat which is provided by RPM as package managers. They provide you easy installation and removal to software information is stored in a local database packages are provided by our Rh L and Red Hat.

They use a centralized management of multiple systems. So multiple system can store their common data on the same system. And RPM is very different from Debian. So Debian commands and even native files won't run on RPM, and RPM native files won't run on Debian, like a pity get install is a native utility of Debian based systems like Ubuntu. So that command would won't work on RTL and yum that is a command which is used to install and download the software or other utilities from net that is an RPM package and would not work on Debian based systems like Ubuntu. They are easily retrieval of different packages and customer package repositories.

Can also be used and downloaded. There are different graphical package management systems like up pub, which is located in application system tools, software updater. You can list and install software updates from the air. The pump is a useful tool where you can update your systems or tools. Then there is another tool that is called pirate or P IR UT, which could be found on application add and remove software where you can install view and uninstalled different packages. Which is same as add or remove features windows where you can install and install different software's.

Then there comes the young package management tool that is short for YALI unified, Yala management package. When named after the University of the USA, where the researchers scholars founded C'mon, it is a front end to rpm replacing up to date command. The configuration file for yum is located in EDC slash young configuration file and etc slash young dot repos dot d file. It is used to install remove and list different software's. So, we can search first we need to search a particular package online. So, the syntax for the searching the package will be here, the space source and the name of the package as we did in links.

Then when the search item is found, then we need to install after installation if you want to remove you can remove if you want to update you can update if you want to know information Regarding the package, updated information or other information, so, you could do so. And similarly if you want to list all the packages that are available on the internet to be downloaded, you could be you could right at why you list available, it will show you all the available packages will name. Similarly, if you want to generate a list of all the packages installed on your device system, you could do so by writing yum list installed. Then there comes the main concern of the system that is security. You can secure system by basic security principles. Avoid running services that you don't need.

Limit access to services that are running. Don't allow all the permissions READ WRITE execute permission to every user for every sensitive folders and files. Avoid using services that send data unencrypted other networks such as instant messaging pop, I'm Fm 10. net use SSL, which is preferred over other modes of communication. There is a great concept that is implemented by RTL is se, that is security and nice line x, which is a kernel level security system where all processes and files have a context epsilon x policy dictates how processes and files may interact based on context policy rules, which cannot be overridden. The default policy does not apply to all services. So, it is a kernel level security which allows you to secure a system no virtual contract could be implemented without by without implementing se linings.

Later we will learn about them. That is virtualization technology. He is the managing as he line x would be a useful thing. I see Linux violations are logged in the system log, when you boil it as Eli makes things like x trying to access a kernel or quality or any of the kernel that is being logged does not allow you to access then it is printed on the system log if you could do any harm, otherwise you could not do any harm. So lives can be disabled in an emergency when you need to need an urgent data backup are different in a wide range of scenarios. However disabling selinux is not encouraged because it is unsafe.

Is specifically if you are if your server is over internet net makes is one vulnerable system configuration SC Linux would be the file where you can manage SC Linux and the UI mode could be fine with within system administration as he lands management. Then there comes a management of firewall and si MCs firewalls allow you to provide to keep your network secure from outside attackers or malicious traffic. The system config security level would be the firewall location. It could be found from system administration, security level and firewall and could be configured by DUI or other CLA mode. It allows you to selectively block incoming connections by port or block. You could block or allow.

You could lock virtual ports, different port numbers like 800 or 443, and different polls. The responses to outbound queries always are accepted. Alternate interfaces for SC Linux configuration could be found here. And more advanced configuration possible with other tools could be implemented here with se Linux and firewall. So this was a security. Try to learn more about security.

And you have learned a lot about our HCl. Keep, keep practicing. I usually use the practice paper and was the practical exercises carefully. If you are preparing for the certification, All the best to you. If you're not preparing for the certification, you might have learned a lot of things. Wish you a bright future ahead, keep learning and keep moving ahead.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.