Recent Articles

How To Backup LVM Configuration On Linux (vgcfgbackup & vgcfgrestore)

Due to several reason a volume group may become corrupted after unintended user intervention. LVM will not be aware of this situation unless the alternate is already on the volume group, and may allow to add the alternate path to a different volume group. Two of the useful commands provided as part of LVM are vgcfgbackup and vgcfgrestore. […]

February 25, 2011 | By
| Reply More

4 Steps Passwordless SSH Login and Updating Keys

Hi all, today we'll gonna learn how we can setup Passwordless SSH Logon to Linux systems. Only the workstations having the correct matching key pair (private and public) will be allowed to logon to the SSH server, without the key paring, access will not be allowed. Usually, we need to enter username and password combination to […]

February 25, 2011 | By
| Reply More

How to Create Partition in Linux using fdisk Tool

Fdisk is command-line utility that provides disk partitioning functions for various operating systems. It was originally developed by IBM in 1983 and since then it was used on most operating systems from DOS to Windows and to Unix-based systems. Using fdisk to create a new partition Here I’m trying to create a partition on the disk […]

February 25, 2011 | By
| 2 Replies More

Linux Encrypted Filesystem Using Loopback Filesystem

If you have a computer that is really important, you don’t want to blow away your OS on a regular basis after an experiment goes awry – This is perhaps the reason the loopback file system was born. With this handy tool, you can create an image file containing the file system of your choice, […]

February 25, 2011 | By
| Reply More

Tips To Sort Out Linux Booting Issues

Sometimes it happens on reboot the system gets panic or some error message like "init not found" is displayed, preventing from proper booting; then as first step you can try pass init=/bin/bash (Grub boot loader) or linux init=/bin/bash (if Lilo boot loader). This will launch you straight into a Bash shell prompt. Then you can […]

February 23, 2011 | By
| Reply More

How To Enable, Create, Activate Ethernet Bonding in Linux

During your projects or during your experiences(experiments) regarding administration systems and network, you doubtless go one day to be confronted with the problems of load balancing and high availability of links ethernet. Ethernet bonding is a method of combining (joining) two or more network interfaces together into a single virtual NIC card which may increase the […]

February 23, 2011 | By
| 2 Replies More

How Scan LUN In Redhat Linux Vmware Guest OS

In this blog, I am trying to give some examples that show how to scan LUN from a Redhat Linux Vmware Guest OS (This example is from RHEL3). Once LUNs are mapped for VM's, it should be made visible to the OS. Below article explains and helps to scan and identify the disks/LUNs that are […]

February 23, 2011 | By
| Reply More

3 Commands To Unmount when NFS Mounted Directory is Busy

When you do an NFS mount, it can happen that, for some reasons, we are not able to unmount the disk/partition. When it happens, if we care to lost data, we need to use a safety method to resolve the problem and properly unmount our disk/partition. There are different ways and options we can try […]

February 22, 2011 | By
| Reply More

Easy Steps Enabling SNMP and Configuration In Linux

Before I explain about Linux SNMP configuration, I'll let you know what is SNMP. Simple Network Management Protocol (SNMP) is a well known protocol for network management. It is really hard to manage large networks that have thousands of network device. SNMP helps you to monitor nodes from a management host. You need to install SNMP […]

February 22, 2011 | By
| Reply More

How To Use Linux Tr Command With Examples

The tr command is used in Linux for translating characters. it needs two sets of characters. It replaces occurrences of the characters in the first set with the corresponding character from the second set. For example, tr command can be used to change small letters to capital letters and likewise. When the strings are of the […]

February 22, 2011 | By
| Reply More

How to Set and View StickyBit, SUID & SGID in Linux with Examples

The regular file and directory permissions in Unix / Linux world are read, write and execute permissions for owner, group and other. In this article, we explain special permissions that work on files and directories named as Stickybit, SUID and SGID. What is  Sticky Bit The sticky bit works on directories only. If a user […]

February 21, 2011 | By
| 6 Replies More