linux partition command fdisk fdisk usb drive

Most Relevant Content

  • CentOS 7 Partition Management with fdisk Utility

    CentOS or Red Hat Linux is a popular server operating system to the system administrators. Almost all the system admins or IT guys who play with mail server, file server, proxy server and so on are so known with CentOS or Red Hat Linux and cannot go a single day without this operating system. The guys who are also wish to be a system admin should be familiar with CentOS or Red Hat operating system. In my previous article, I discussed how to install CentOS 7 step by step with GUI mode (GNOME Desktop) or CLI mode (minimal installation). I also discussed how to configure network with nmtui tool as well as editing network files. In this article, I will discuss how to manage CentOS 7 or Red Hat 7 Linux partition with the fdisk tool. But before going to start, we should have some basic idea on the following terms. File System In computer system, a File System defines how data or information is stored and retrieved from a storage disk. In Windows Operating System, the popular file systems are FAT32 and NTFS. On the other hand in Linux Operating System, the popular file systems are ext2, ext3, ext4, [...]

    READ MORE »

  • More Similar Content

  • »

    How to Mount USB Device in CentOS 7 (NTFS and Linux FS) |   February 18, 2019

    USB Hard Disk Drive or USB Flash Drive (Pen drive) is a popular external device that can be used to backup data or transfer data from one device to other device. In GUI (Graphical User Interface) Operating System such as Window or GNOME Desktop in Linux can automatically mount USB device and can show data in it if the File System of that device is supported. But all users do not like or always do not have GUI mode of [...]

    READ MORE »

  • You May Also Like

  • »

    How to Block VPN Access with MikroTik Router |   May 14, 2019

    Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]

    READ MORE »

  • »

    Linux Text Editor |   September 7, 2017

    Everything is file in Linux operating system. So, anyone who wants to work with Linux operating system (specially, Red Hat or CentOS) must learn how to edit files in Linux operating system. Because, it is always prefer to avoid graphical user interface (GUI) for changing system configuration parameters in Linux operating system unlike Windows operating system.  You should be expert enough to edit any file in Red hat Linux operating system  otherwise you will face a lot of difficulty to [...]

    READ MORE »

  • »

    The Role of Computer Networking in Modern Surveillance and Security |   October 17, 2023

    In the present computerized age, computer networking is significant in ensuring modern surveillance and security frameworks are viable and productive. The progressions in innovation have prompted the improvement of innovative arrangements, for example, solar power cameras, that depend on computer networks to upgrade surveillance capacities. This article investigates the role of computer networking in modern surveillance and security frameworks, with a particular spotlight on integrating solar-powered cameras. What is Computer Networking? A computer network gathers interconnected hubs or computing gadgets that [...]

    READ MORE »

  • »

    MikroTik VLAN Routing Configuration with Manageable Switch |   July 11, 2018

    A VLAN (Virtual LAN) is a group of computers, servers, network printers and other network devices that behave as if they were connected to a single network. VLAN is a logical topology that divides a single broadcast domain into multiple broadcast domains. VLAN is a layer 2 method. So, a manageable switch is required to manage VLAN in your network and a router is required to route and control your inter-VLAN. VLAN increases network security and performance as well as [...]

    READ MORE »

  • »

    How to Block WiFi Access although Password is Known |   April 23, 2024

    We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]

    READ MORE »

  • »

    Single IP NAT Strategy in MikroTik RouterOS 7 |   September 29, 2015

    MikroTik Router has a lot of features which help to customize network as our requirement. Sometimes, it may be our requirement that we need to allow internet access on per IP. Normally, when we apply masquerade NAT rule in our MikroTik Router, all private IPs will be masqueraded or a network block will be masqueraded. If we do normal masqurade and enable a DHCP Server in our network, we may face a lot of unauthorized access in our network. Because [...]

    READ MORE »

  • »

    MikroTik VPN Configuration with PPTP (Connecting Remote Client) |   August 17, 2016

    VPN (Virtual Private Network) is a technology that extends private network across a public network. It enables private network users to send and receive data across public network as if their network devices were directly connected to the private network. There are many VPN services in MikroTik RouterOS 7. Among them, MikroTik PPTP is a mostly used VPN service. It is a client-server VPN technology. So, a user can access server, printer, IP phone and any other network devices of [...]

    READ MORE »

  • »

    Securing MikroTik Router with Port Knocking |   March 21, 2021

    MikroTik Port Knocking strategy helps to protect MikroTik Router from hackers and unauthorized access as well as enhances MikroTik RouterOS security.

    READ MORE »