lvextend
Most Relevant Content
LVM Management in CentOS/Red Hat 7 Linux
LVM (Logical Volume Manager) is the recommended partition method for CentOS/Red Hat 7 Linux. Specially, if we work on Mail Server, File Server, FTP Server, Web Proxy Server or any application where disk space changes frequently, the LVM partition is mandatory in this case. In my previous article, I discussed how to install CentOS 7.5 with LVM partitioning. If you are new here or CentOS 7 is not yet installed, I will suggest you to follow my previous article and install CentOS 7 with LVM partitioning and then continue this article. In this article, I will discuss how to manage LVM partitioning in CentOS/ Red Hat 7 Linux with the command line utility. Basic Components and Architecture of LVM Before going to start LVM management with command line tool, we should have basic knowledge on the basic LVM terms and architecture. The following three terms are the basic components of the LVM partitioning. Physical Volume: The underlying physical storage unit of an LVM is a block device such as a partition of a disk or the whole disk. To use the block device for an LVM logical volume, the device must be initialized as a physical volume (PV). Volume Groups: [...]
- »
Reset Mozilla Firefox to Default Settings | August 26, 2015
Mozilla Firefox is a free and open source web browser developed Mozilla Corporation. Mozilla Firefox is available for most of the popular operating system like Windows, macOS and Linux operating system. It is also a default web browser in Linux operating system. Mozilla Firefox is a popular web browser to any online user. It is said that no online user can go a single day without this Browser. I am also a fan of Mozilla Firefox browser and using this [...]
- »
How to Secure MikroTik RouterOS Login Users | February 19, 2021
MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.
- »
HTTP vs. HTTPS: The Impact Of Using SSL Certificates | November 29, 2021
Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra “S” at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]
- »
How to Import SSL Certificate in MikroTik RouterOS | January 16, 2022
SSL/TLS Certificate is used to make secure communication between server and clients. MikroTik RouterOS has a lot of services such OVPN, SSTP VPN, HTTPS, Hotspot and so on those use SSL/TLS certificate. It is possible to create self-signed certificate in MikroTik RouterOS but self-signed certificate faces untrusted CA warning. So, it is always better to use trusted CA either freemium or premium. In my previous article, I discussed how to get a free SSL/TLS certificate from Zero SSL but Zero [...]
- »
Turn Computer into Wi-Fi Hotspot | September 17, 2015
Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as [...]
- »
User Management in Linux (Red Hat/CentOS) | September 28, 2017
User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]
- »
Port Based Apache Virtual Hosting on RHEL 7 | July 26, 2019
Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be Name Based, IP Based or Port Based. In Name Based Virtual Hosting, multiple domains can be hosted on single Server and single IP address. On the [...]
- »
Computer Network Topology Outline | September 12, 2017
The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]
- »
How to Separate MikroTik Hotspot and DHCP IP Pool | October 9, 2020
MikroTik default Hotspot Setup comes with a DHCP Server (which uses same IP Pool of Hotspot Server) to provide IP address and other network information to a connected device. Using this automatic IP address connected device can access Hotspot login page. After successfully login, a one to one NAT IP address is also assigned for the device and this process happens internally in Hotspot Server. User device cannot know this one to one NAT IP assigning. However, Hotspot Server actually [...]
You May Also Like