redhat 7 minimal installation
Most Relevant Content
Red Hat/CentOS 7 Linux Installation (Minimal Packages)
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with its upstream source, Red Hat Enterprise Linux (RHEL). All the commands and functionalities those are available in Red Hat Enterprise Linux are available in CentOS Linux. In this article, I will show how to install current version of CentOS (CentOS 7) with minimal packages. CentOS 7 minimal installation with 7 Easy Steps CentOS 7 can be installed with 7 easy steps if you have minimum 256MB RAM, 2GB disk space and 64 bit CPU architecture because CentOS 7 does not support 32 bit CPU architecture. Step 1: Downloading CentOS 7 ISO and Making Bootable Drive First step to install CentOS 7 is to download CentOS 7 ISO image file. Go to CentOS official site centos.org and click on GET CENTOS menu link [...]
- »
Web Server Configuration in Linux with Apache, MariaDB and PHP | January 2, 2018
Web Server is one of the most important and most used servers today. Without web server internet cannot imagine. Even, the article you are reading is also served by a web server. So, having web server configuration knowledge is beneficial for you, I think. A web server is responsible to serve HTTP (Hypertext Transfer Protocol) contents such as text, image, audio, video etc. to its clients. A lot of web servers are present today such as Apache, IIS, Nginx and [...]
- »
Red Hat/CentOS Network Configuration | August 4, 2017
Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]
- »
How to Block MAC Address in MikroTik RouterOS 7 | July 11, 2024
MikroTik RouterOS 7 by default allows any MAC address to get internet connection through it. But we may need to block some MAC addresses sometimes. There are three methods to block MAC address in MikroTik RouterOS 7 – Blocking MAC Address using Bridge Filter Rule. Blocking MAC Address using Firewall Filter Rule and Blocking MAC Address from DHCP Lease. We can use any of these methods if we want to block MAC Address in MikroTik Router. In this article, we [...]
- »
OpenVPN Configuration over Port 443 on Ubuntu Linux | June 20, 2022
OpenVPN provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which can be blocked, OpenVPN can highly be customized and even can be run over so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN Server can easily install on Ubuntu Server. Installing OpenVPN Server on Ubuntu Server, we can connect Windows, [...]
- »
Free Internet Speed Test Online | August 31, 2015
You are here because you want to check your broadband internet speed. Don’t worry, I will show you how to check your internet speed from online absolutely free and fastest way. I will show you top 4 websites link from which your broadband internet speed can be checked so easily. I will also show you how to check bandwidth usage continuously with windows operating system’s utility and a third party software utility. So, keep reading this article and find how [...]
- »
MikroTik Hotspot Login by HTTP CHAP, HTTP PAP and HTTPS | July 25, 2020
MikroTik Hotspot uses various types of login methods. Among these login methods HTTP CHAP, HTTP PAP and HTTPS are basic and important login methods. So, a MikroTik system administrator should have proper understanding on Hotspot HTTP CHAP, HTTP PAP and HTTPS login methods. In my previous article I discussed how to configure MikroTik Hotspot using Winbox. In this article I will discuss how to use HTTP CHAP, HTTP PAP and HTTPS login methods properly in MikroTik Hotspot Server. MikroTik Hotspot [...]
- »
MikroTik Hotspot Auto Login by MAC Address | July 1, 2020
Hotspot is an awesome service in MikroTik Router. MikroTik Hotspot is popularly used in ISP, Hotel, Airport, Coffee Shop, Enterprise office and many other organizations. By default MikroTik Hotspot uses HTTP CHAP login method where user must provide username and password to get internet service. Sometimes we may face that some users are not eager to provide username and password to get internet service or we cannot ask some users to put username and password to get internet due to [...]
- »
Hardening MikroTik RouterOS by Limiting Login Services | February 6, 2021
MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]
- »
How to Prevent Simultaneous User Login in MikroTik Hotspot | November 10, 2020
MikroTik Hotspot is a user based internet access system. Most of the user authentication and authorization can be controlled with MikroTik Hotspot. But sometimes some users misuse user based authentication system. Misusing simultaneous login is one of them. Usually we provide one username and password for a user and we expect he/she will use this username and password from only one device at a time. But it is also possible to use same username and password in multiple devices at [...]
More Similar Content
You May Also Like