Search Engine

Loading

Sallar

Sallar
RedhatEnterpriseLinux Blog

Installation of MySQL on Linux



MySQL

MySQL is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. This is guide, howto install or upgrade MySQL Community Server latest and greatest version 5.5.28 on CentOS 6 and Red Hat (RHEL) 6.


Install MySQL Database 5.5.28 on CentOS 6/5, Red Hat (RHEL) 6/5

1. Change root user
su -

CentOS and Red Hat (RHEL)
Run the following command defined with your Operating system

Installing PostgreSQL9.2 on Redhat (RHEL5 & 6)



Installing PostgreSQL9.2 on Redhat (RHEL)
the same installation you can use for CentOS

1. Install PostgreSQL 9.2.1 Database Server on CentOS/Red Hat (RHEL)
1.1 Change root user or login as a root
su –
Example: su - root
1.2 Red Hat (RHEL)
Add exclude to /etc/yum/pluginconf.d/rhnplugin.conf file [main] section:
[main]
...
exclude=postgresql*

Ubuntu 12.10 has been released

Ubuntu 12.10 has been released. Featuring many popular open-source applications, up-to-date Unity desktop and new cloud-related features, the latest version of Canonical's Linux distribution for desktops and servers is ready for download: "Ubuntu 12.10 introduces innovations that bring together desktop and cloud-based experiences, representing the next stage in the transition to a multi-device, cloud-based world. New Previews give large, clear previews of content as it appears in the Dash search results, giving users a quick way to get more information to help find what they are looking for. The new Web Apps feature makes frequently used web applications available through the desktop.


Download: Official Website
ubuntu-12.10-desktop-i386.iso
ubuntu-12.10-desktop-amd64.iso

Protecting Against Intruders with Security- Firewall



As an administrator in today’s world of networked computing and easy access to the Internet, security both internally and externally must be the first and last issue considered. Denying unauthorized access is the first step to keeping your system secure. The mechanism to prevent access to all or some network services on a system is called a firewall.
Every operating system allows for the implementation of a firewall differently. Red Hat Enterprise Linux uses IPTables, a network packet-filtering mechanism in the Linux kernel. IPTables can be used to allow or deny packets based on numerous factors including their destination, their source, which port they are trying to access, the user ID of the process that created the packet, and more.
Install the iptables RPM package to use IPTables. It includes utilities to configure which packets to filter. The IPTables configuration consists of a series of rules. Each rule must be for a specific table, with each table having its own set of chains. A chain is a list of rules, which are compared to the packets passed through the chain. If a set of packets matches a chain, the target of the rule tells the system what to do with the packets, including passing it along to a different chain.
This section discusses how to write and enable IPTables rules. It also discusses the Red Hat Enterprise Linux security levels, which are predefined sets of IPTables rules. They can be used to quickly implement a basic firewall.

Protecting Against Intruders with Security- Enhanced Linux



On a system without Security-Enhanced Linux (SELinux) enabled, discretionary access control (DAC) is used for file security. Basic file permissions are used to grant file access to users. Users and programs alike are allowed to grant insecure file permissions to others. For users, there is no way for an administrator to prevent a user from granting world-readable and world writable permissions to his files. For programs, the file operations are performed as the owner of the process, which can be the root user, giving the program access to any file on the system.
SELinux is a mandatory access control (MAC) mechanism, implemented in the kernel. Programs protected by SELinux are only allowed access to parts of the filesystem they require to function properly, meaning that if a program intentionally or unintentionally tries to access or modify a file not necessary for it to function or a file not in a directory controlled by the program, file access is denied and the action is logged. The ability to protect files with SELinux is implemented in the kernel. Exactly what files and directories are protected and to what extent they are protected is defined by the SELinux policy. This section gives instructions on how to enable the SELinux protection mechanism, describes the SELinux policies available in Red Hat Enterprise Linux, tells you how to read the SELinux permissions of a file, shows how the SELinux Troubleshooting Tool alerts you of SELinux errors, and steps you through how to change the security context of files.

Windows 8 Installation Step by Step




Window 8 Installation

Step 1:
The first thing you should do is head to Windows 8 and downloads the installation image for your chosen architecture. The image used in the creation of this guide is the 64-bit (x64) ISO.
Step 2:
Using your disc burning software, burn the .iso you downloaded to a DVD.  and boot form your CD-ROM Drive.
Step 3: 

Once loaded you will see the following screen.
Select your location, keyboard and regional language settings as required and click "next" to continue and you'll see the following box:

Google Chrome for Linux

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites; Access your favorite pages instantly with lightning speed from any new tab.

Download: Google Chrome

Frozen Bubble game for linux





Frozen Bubble

Colorful 3D rendered penguin animations, 100 levels of 1p game, hours and hours of 2p game, nights and nights of 2p/3p/4p/5p game over LAN or Internet, a level-editor, 3 professional quality digital soundtracks, 15 stereo sound effects, 8 unique graphical transition effects, 8 unique logo eye-candies.

Download: Frozen Bubble

Powered by Blogger.

Ads

 
Copyright © Redhat Enterprise linux. Original Concept and Design by My Blogger Themes
My name is Abdul Razaq but people call me Raziq. Here is my home page: www.redhatenterpriselinux.blogspot.com I live in Quetta, Pakistan and work as an IT-Engineer.