mount external hard drive centos

Most Relevant Content

  • How to Mount USB Device in CentOS 7 (NTFS and Linux FS)

    USB Hard Disk Drive or USB Flash Drive (Pen drive) is a popular external device that can be used to backup data or transfer data from one device to other device. In GUI (Graphical User Interface) Operating System such as Window or GNOME Desktop in Linux can automatically mount USB device and can show data in it if the File System of that device is supported. But all users do not like or always do not have GUI mode of Operating System specially the CentOS or Red Hat Linux user. In this case, USB device must be mounted manually and then access data from it. On the other hand, by default Linux (CentOS or Red Hat) does not support NTFS File System. But most of the USB devices are usually formatted with NTFS which is a Windows supported file system. To read or write data from NTFS formatted disk in CentOS or Red Hat Linux, a third party application named NTFS-3G have to be used. How to create or delete disk partition with fidisk utility was discussed in my previous article. In this article, I will discuss how to format USB devices and how to mount USB devices in CentOS [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Router Static DHCP Server Configuration |   October 25, 2015

    DHCP server helps to assign IP address and other related IP information (Subnet mask, Gateway and DNS) automatically in a network. But automatic DHCP server has some disadvantages too. If any IP device is connected to any automatic DHCP enabled network, the device will get an IP address and related IP information automatically by the DHCP server and the device will start to use resources of this network. So, the network administrator cannot know who is being connected to the [...]

    READ MORE »

  • »

    WiFi Station Setup in MikroTik Wireless Router |   November 27, 2019

    MikroTik Wireless Router is capable of working as a WiFi Client.  So, if any ISP provides WiFi connection for their clients, MikroTik Wireless Router can be used to connect to that ISP SSID by configuring wireless station mode. MikroTik WiFi station mode finds available SSID and connects with permitted SSID.  This wireless connection can be used as wireless WAN connection and configuring LAN, multiple devices can get internet over this wireless WAN connection. In my previous article, I discussed how [...]

    READ MORE »

  • »

    MikroTik Bandwidth and Resource Monitoring with Graphs |   January 31, 2018

    “Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and [...]

    READ MORE »

  • »

    MikroTik Block Website (Facebook, YouTube and Other Sites) |   October 12, 2017

    MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]

    READ MORE »

  • »

    How to Block Tor Browser with MikroTik Router |   June 12, 2019

    Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]

    READ MORE »

  • »

    Internet Connection Sharing Ethernet to Ethernet |   September 22, 2015

    Windows is the most popular operating system to any computer user. It is said that no computer user cannot go a single a day without windows operating system. Windows has a lot of default internet features which help to connect our computer to internet as well as it provides internet connection sharing facility. With Internet Connection Sharing (ICS) feature, you can turn your laptop into Wi-Fi hotspot or turn your desktop into a router to share your broadband connection with your family [...]

    READ MORE »

  • »

    MikroTik VLAN and Bridge Configuration |   September 19, 2017

    VLAN and Bridge are two useful features in MikroTik Router.  These two features are frequently used in any MikroTik network configuration. VLAN divides a physical interface into multiple logical interfaces. So, you can isolate your network into multiple logical networks on a physical interface. On other hand, MikroTik Bridge integrates multiple physical interfaces in a logical interface. So, you can extend your broadcast domain on multiple physical interfaces and can extend your popular services such as PPPoE or DHCP on [...]

    READ MORE »

  • »

    How to Assign Static IP Address in Windows OS |   September 16, 2015

    Communication between one computer to another computer or server is established with IP addresses. Without IP address no communication is possible in computer network. An Internet Protocol (IP) Address is a numerical value or label assigned to each electronic device (e.g., computer, smartphone and printer) which uses Internet Protocol for communication. IP can be assigned both dynamically and statically on a IP devices. Dynamic IP is assigned by a DHCP server. If a DHCP server is present in a network, [...]

    READ MORE »

  • »

    How to Get Free SSL Certificate from ZeroSSL |   June 13, 2020

    SSL/TLS certificate is an essential part in today internet communication. Online communication cannot imagine without SSL/TLS certificate. SSL/TLS certificate makes online communication secure by encrypting data transmitted over public internet. So, most of the applications (Web, Email and VPN services) those transmit data over public internet use SSL/TLS certificate to secure communication. SSL/TLS certificate requires to be signed by Certificate Authority (CA). It is possible to create self-signed certificate with SSL certificate creation tools such as OpenSSL. Some router venders [...]

    READ MORE »