mount external hard drive centos
Most Relevant Content
How to Mount USB Device in CentOS 7 (NTFS and Linux FS)
USB Hard Disk Drive or USB Flash Drive (Pen drive) is a popular external device that can be used to backup data or transfer data from one device to other device. In GUI (Graphical User Interface) Operating System such as Window or GNOME Desktop in Linux can automatically mount USB device and can show data in it if the File System of that device is supported. But all users do not like or always do not have GUI mode of Operating System specially the CentOS or Red Hat Linux user. In this case, USB device must be mounted manually and then access data from it. On the other hand, by default Linux (CentOS or Red Hat) does not support NTFS File System. But most of the USB devices are usually formatted with NTFS which is a Windows supported file system. To read or write data from NTFS formatted disk in CentOS or Red Hat Linux, a third party application named NTFS-3G have to be used. How to create or delete disk partition with fidisk utility was discussed in my previous article. In this article, I will discuss how to format USB devices and how to mount USB devices in CentOS [...]
- »
MikroTik Router Static DHCP Server Configuration | October 25, 2015
DHCP server helps to assign IP address and other related IP information (Subnet mask, Gateway and DNS) automatically in a network. But automatic DHCP server has some disadvantages too. If any IP device is connected to any automatic DHCP enabled network, the device will get an IP address and related IP information automatically by the DHCP server and the device will start to use resources of this network. So, the network administrator cannot know who is being connected to the [...]
- »
WiFi Station Setup in MikroTik Wireless Router | November 27, 2019
MikroTik Wireless Router is capable of working as a WiFi Client. So, if any ISP provides WiFi connection for their clients, MikroTik Wireless Router can be used to connect to that ISP SSID by configuring wireless station mode. MikroTik WiFi station mode finds available SSID and connects with permitted SSID. This wireless connection can be used as wireless WAN connection and configuring LAN, multiple devices can get internet over this wireless WAN connection. In my previous article, I discussed how [...]
- »
MikroTik Bandwidth and Resource Monitoring with Graphs | January 31, 2018
“Am I getting my committed bandwidth?” is a common question to any network administrator. This question may arise either from your customer or from your owner if you are an employee of any organization. If you feel boring hearing this question and want to establish a system where your customer will be able to inspect his bandwidth usage, MikroTik Graphing is your best friend. MikroTik Graphing can be used to display graphics for traffic which is passed through interfaces and [...]
- »
MikroTik Block Website (Facebook, YouTube and Other Sites) | October 12, 2017
MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]
- »
How to Block Tor Browser with MikroTik Router | June 12, 2019
Tor Browser is an alternative to VPN and Web Proxy that breaks blocking firewall rule. If any user installs and uses Tor Browser, he/she can hide the public IP address of router and can unblock blocked websites applied on a network. So, administrators should block Tor Nodes along with other blocking firewall rule. In my previous article, I discussed how to block VPN and Proxy access with MikroTik Router and in this article I will discuss how to block Tor [...]
- »
Internet Connection Sharing Ethernet to Ethernet | September 22, 2015
Windows is the most popular operating system to any computer user. It is said that no computer user cannot go a single a day without windows operating system. Windows has a lot of default internet features which help to connect our computer to internet as well as it provides internet connection sharing facility. With Internet Connection Sharing (ICS) feature, you can turn your laptop into Wi-Fi hotspot or turn your desktop into a router to share your broadband connection with your family [...]
- »
MikroTik VLAN and Bridge Configuration | September 19, 2017
VLAN and Bridge are two useful features in MikroTik Router. These two features are frequently used in any MikroTik network configuration. VLAN divides a physical interface into multiple logical interfaces. So, you can isolate your network into multiple logical networks on a physical interface. On other hand, MikroTik Bridge integrates multiple physical interfaces in a logical interface. So, you can extend your broadcast domain on multiple physical interfaces and can extend your popular services such as PPPoE or DHCP on [...]
- »
How to Assign Static IP Address in Windows OS | September 16, 2015
Communication between one computer to another computer or server is established with IP addresses. Without IP address no communication is possible in computer network. An Internet Protocol (IP) Address is a numerical value or label assigned to each electronic device (e.g., computer, smartphone and printer) which uses Internet Protocol for communication. IP can be assigned both dynamically and statically on a IP devices. Dynamic IP is assigned by a DHCP server. If a DHCP server is present in a network, [...]
- »
How to Get Free SSL Certificate from ZeroSSL | June 13, 2020
SSL/TLS certificate is an essential part in today internet communication. Online communication cannot imagine without SSL/TLS certificate. SSL/TLS certificate makes online communication secure by encrypting data transmitted over public internet. So, most of the applications (Web, Email and VPN services) those transmit data over public internet use SSL/TLS certificate to secure communication. SSL/TLS certificate requires to be signed by Certificate Authority (CA). It is possible to create self-signed certificate with SSL certificate creation tools such as OpenSSL. Some router venders [...]
You May Also Like