Skip to main content

Posts

Showing posts from August, 2011

Linux Installation From Usb drive

To find information about your devices and current partitions run: # dmesg | less # dmesg | egrep -i 'cd|dvd' # fdisk -l Use the first command to identify the USB device name. Mount CD/DVD ISO or DVD ITSELF Type the following command to mount Fedora 12 iso image: # mount Fedora-12-x86_64-netinst.iso -o loop /media/cdrom0/ # DVD=/media/cdrom0 # ls -l $DVD Sample outputs: total 6 dr-xr-xr-x 3 root root 2048 2009-11-09 05:37 EFI drwxr-sr-x 3 root 499 2048 2009-11-09 05:37 images drwxr-sr-x 2 root 499 2048 2009-11-09 05:36 isolinux You need to use files stored in isolinux directory to create a bootable usb pen. Format Usb Create the fdisk partition : # fdisk /dev/sdb You need to create only 1 partition. Next format the partition: # USB=/media/usb # mkdosfs /dev/sdb1 Finally mount the partition: # mkdir -p /media/usb # mount /dev/sdb1 /media/usb # USB=/media/usb Copy Required Files Type the following commands: # cp -av $DVD/isolinux/* $USB # cd...

SSl configration in Server 2008

Installing an SSL Certificate in Windows Server 2008 (IIS 7.0) Microsoft's new server platform, Windows Server 2008 uses Internet Information Services (IIS) 7.0 . This new version makes big changes in the way that SSL certificates are generated, primarily making it much easier than previous versions of IIS. In addition to the new method of requesting and installing SSL certificates, IIS 7 includes the ability to: Request more than one SSL certificate at a time Import, export, and renew SSL certificates easily in IIS Quickly create a self-signed certificate for testing This article will walk you through the process of ordering an SSL certificate from a commercial certificate authority and installing it on an IIS 7 Windows Server 2008 machine. Create the Certificate Signing Request The first step in ordering an SSL certificate is generating a Certificate Signing Request . This is very easy to do in IIS7 using the following instructions. Click here to hide or show the ima...

active directory Structor

Active Directory Data Store (Directory) The Active Directory data store is the database that holds all the directory information such as information on users, computer, groups, other objects, and information on the objects which users can access. It also includes other network components. Another name used to refer to the Active Directory data store is the directory. The Active Directory data store or directory is stored on the hard disk of the server by means of the Ntds.dit file. The file has to be stored on a drive that is formatted with the NTFS file system. The Ntds.dit file is placed in the Ntds folder in the systemroot. When changes are made to the directory, these changes are saved to the Ntds.dit file. Because all the data in Active Directory is stored in one distributed data store, the availability of data is improved. A centralized data store means less duplication, and also needs less administration. Because domain controllers are utilized to manage domains, each domai...

UnderStanding Trust Relationship

What are trust relationships In the Windows NT domain model, domains had to be bound together through trust relationships, simply because the SAM databases used in those domains could not be joined. What this meant was that where a domain trusted another Windows NT domain, the members of the domain could access network resources located in the other domain. Defining trust relationships between domains eliminates the need for an Administrator to configure user accounts in multiple domains. In a trust relationship, the two domains are referred to as the trusting domain and the trusted domain. The trusted domain is the domain where the trust relationship is created. The trusting domain is the other domain specified in the trust, that is, the one wherein network resources can to be accessed. The trusting domain in this case recognizes the logon authentications of the trusted domain. The logon trust relationship is supported by the NT LanMan Challenge Response. This allows pass-through au...

Centralized syslog server

This article will explain installing and configuring a syslog log server in redhat enterprise linux. It'll work in other redhat distributions like centos, fedora etc. Centralized log server (syslog server) Suppose we have a server and 10 client machines. And we want to monitor the logs of all those client machines. In situations like this, we will use centralized server as a log server. Whatever events are happening in client machines, the logs will be sent to the server. So that we can monitor all the logs from a centralized server. We make use of syslog service for this. Configuration of server machine(syslog server) Service name: syslog configuration file: /etc/sysconfig/syslog Steps: 1. Open the /etc/sysconfig/syslog file and add "-r" option to the variable SYSLOGD_OPTIONS as shown below. [root@server ~]# cat /etc/sysconfig/syslog # Options to syslogd # -m 0 disables 'MARK' messages. # -r enables logging from remote machines # -x disables DNS lo...

DNS CONFIGURATION IN RHEL 6

LINUX RHEL 6 BIND DNS [root@desktop6 ~]# yum install bind* Loaded plugins: refresh-packagekit, rhnplugin This system is not registered with RHN. RHN support will be disabled. Setting up Install Process Package 32:bind-libs-9.7.0-5.P2.el6.x86_64 already installed and latest version Package 32:bind-utils-9.7.0-5.P2.el6.x86_64 already installed and latest version Resolving Dependencies --> Running transaction check ---> Package bind.x86_64 32:9.7.0-5.P2.el6 set to be updated ---> Package bind-chroot.x86_64 32:9.7.0-5.P2.el6 set to be updated ---> Package bind-devel.x86_64 32:9.7.0-5.P2.el6 set to be updated ---> Package bind-dyndb-ldap.x86_64 0:0.1.0-0.9.b.el6 set to be updated ---> Package bind-sdb.x86_64 32:9.7.0-5.P2.el6 set to be updated --> Processing Dependency: libpq.so.5()(64bit) for package: 32:bind-sdb-9.7.0-5.P2.el6.x86_64 --> Running transaction check ---> Package postgresql-libs.x86_64 0:8.4.4-2.el6 set to be updated --> Finis...

Kerberos Authentication With SSH Application

In any network communication, the two stages that the user has to pass through, for getting connected to a remote system and getting access to the resources on the remote system are "Authentication" and "Authorization". Authentication is "the process of verifying an identity claimed by or for a system entity". This is to provide assurance that users (or systems) are who they say they are. Thus, authentication process compares, what user has, to a known constant that is trusted. Most of the time this is done by interacting with the user like getting the username and password. Other forms with the by proxy such as smartcard where the authentication tokens will be stored. These standards are described in RFC 2828 (Internet Security Glossary, May 2000). Authorization refers to a user's ability to access resources on a network, based on user account privileges and rights. This is also known as "access control". Only a user who succe...