Learn about Text Processing Tools in Red Hat Linux Administration – Part 1
Data is the most valuable asset for any organization. Data may be numeric: like integers that represent serial numbers, day of the month, and...
Learn about Managing Services in Red Hat Linux Part 2
In the client/server model, a server is a computer that provides (runs) one or more services to clients. Managing Services is an essential part...
Learn about Managing Services in Red Hat Linux Part 1
One of the most famous terms in the world of computers is the Client-Server Model. In this model, a computer could have one of...
Learn How to Manage Files Ownership and Permissions Part 2
In the previous article, we have discussed what file's ownership and permissions are, and how they work. In this article, we are going to...
Learn How to Manage Files Ownership and Permissions Part 1
Understanding Files and Directories Security in Red Hat
Security is no longer used at boundaries and perimeters only, but should be put in your internal...
Learn How to do Escalating User Privileges Red Hat Linux Part 2
Here is part two of the Escalating User Privileges topic. Have a nice reading.
The /etc/sudoers File
This file contains the policy rules that grant certain...
Learn How to do Escalating User Privileges Red Hat Linux Part 1
In the introduction of the Managing Users and Groups topic, I told you that in a multi-user environment, multiple persons need to have access...
Learn how to Manage Users and Groups in Red Hat Linux Part 4
Adding Users to Group (cont.)
Another way to add users as members of a group is to directly edit the /etc/group file.
To add users ahmed,...
Learn how to Manage Users and Groups in Red Hat Linux Part 3
Deleting User Accounts
If a user has left the firm, so why to keep his/her account any longer? As a security rule: when an employee...
Learn how to Manage Users and Groups in Red Hat Linux Part 2
The Private Group
When a user is added in your Red hat Linux system, a private group having the same name as the user is...