Friends now we have reached in the last theoretical part of Red Hat Enterprise Linux essentials. Here we are going to learn about essential system admin tools and finish our journey with our ATL essentials. So, there are different tools that you can use on average here for various purposes. You can access the installer or retail installer with graphical reinstallation or default installation type. You can switch to useful there are useful features like low resolution for low risk resolution escaped DDC or VNC based installation where you can provide VNC password and netmask with network parameters You can install graphic card, text based installation or serial installation of other devices. When you boot your own OS, the post installation configuration allows you to configure different aspects like a dumb firewall, and security and as line x along with a G y X Window System if necessary if you want to change your default genome to kte or install any other gi X Window tool, you can do so by configuring X Window System.
You can say set a date and time any anywhere after installation during installation and any time in between. You can register with our Archer Red Hat network and get updated RPMs that is redhead package management systems. You can create a user account Configure different things, hardware devices, you can install additional RPMs or read a documentation from CD ROM or pendrive ISO device or any other means, you can manage various services that is a graphical services or other services, the graphical mode to access that services system config services, which could be found easily in application and the command line interface for service management would be located in s beam service and as when ch k config. You can manage different software's on Red Hat which is provided by RPM as package managers. They provide you easy installation and removal to software information is stored in a local database packages are provided by our Rh L and Red Hat.
They use a centralized management of multiple systems. So multiple system can store their common data on the same system. And RPM is very different from Debian. So Debian commands and even native files won't run on RPM, and RPM native files won't run on Debian, like a pity get install is a native utility of Debian based systems like Ubuntu. So that command would won't work on RTL and yum that is a command which is used to install and download the software or other utilities from net that is an RPM package and would not work on Debian based systems like Ubuntu. They are easily retrieval of different packages and customer package repositories.
Can also be used and downloaded. There are different graphical package management systems like up pub, which is located in application system tools, software updater. You can list and install software updates from the air. The pump is a useful tool where you can update your systems or tools. Then there is another tool that is called pirate or P IR UT, which could be found on application add and remove software where you can install view and uninstalled different packages. Which is same as add or remove features windows where you can install and install different software's.
Then there comes the young package management tool that is short for YALI unified, Yala management package. When named after the University of the USA, where the researchers scholars founded C'mon, it is a front end to rpm replacing up to date command. The configuration file for yum is located in EDC slash young configuration file and etc slash young dot repos dot d file. It is used to install remove and list different software's. So, we can search first we need to search a particular package online. So, the syntax for the searching the package will be here, the space source and the name of the package as we did in links.
Then when the search item is found, then we need to install after installation if you want to remove you can remove if you want to update you can update if you want to know information Regarding the package, updated information or other information, so, you could do so. And similarly if you want to list all the packages that are available on the internet to be downloaded, you could be you could right at why you list available, it will show you all the available packages will name. Similarly, if you want to generate a list of all the packages installed on your device system, you could do so by writing yum list installed. Then there comes the main concern of the system that is security. You can secure system by basic security principles. Avoid running services that you don't need.
Limit access to services that are running. Don't allow all the permissions READ WRITE execute permission to every user for every sensitive folders and files. Avoid using services that send data unencrypted other networks such as instant messaging pop, I'm Fm 10. net use SSL, which is preferred over other modes of communication. There is a great concept that is implemented by RTL is se, that is security and nice line x, which is a kernel level security system where all processes and files have a context epsilon x policy dictates how processes and files may interact based on context policy rules, which cannot be overridden. The default policy does not apply to all services. So, it is a kernel level security which allows you to secure a system no virtual contract could be implemented without by without implementing se linings.
Later we will learn about them. That is virtualization technology. He is the managing as he line x would be a useful thing. I see Linux violations are logged in the system log, when you boil it as Eli makes things like x trying to access a kernel or quality or any of the kernel that is being logged does not allow you to access then it is printed on the system log if you could do any harm, otherwise you could not do any harm. So lives can be disabled in an emergency when you need to need an urgent data backup are different in a wide range of scenarios. However disabling selinux is not encouraged because it is unsafe.
Is specifically if you are if your server is over internet net makes is one vulnerable system configuration SC Linux would be the file where you can manage SC Linux and the UI mode could be fine with within system administration as he lands management. Then there comes a management of firewall and si MCs firewalls allow you to provide to keep your network secure from outside attackers or malicious traffic. The system config security level would be the firewall location. It could be found from system administration, security level and firewall and could be configured by DUI or other CLA mode. It allows you to selectively block incoming connections by port or block. You could block or allow.
You could lock virtual ports, different port numbers like 800 or 443, and different polls. The responses to outbound queries always are accepted. Alternate interfaces for SC Linux configuration could be found here. And more advanced configuration possible with other tools could be implemented here with se Linux and firewall. So this was a security. Try to learn more about security.
And you have learned a lot about our HCl. Keep, keep practicing. I usually use the practice paper and was the practical exercises carefully. If you are preparing for the certification, All the best to you. If you're not preparing for the certification, you might have learned a lot of things. Wish you a bright future ahead, keep learning and keep moving ahead.