RHCSA – SSH fingerprint authentication

When you ssh to a linux machine, the first thing the remote machine does is repond by sending a fingerprint id to the requester: [sher@localhost .ssh]$ ssh localhost The authenticity of host ‘localhost (::1)’ can’t be established. ECDSA key fingerprint is d7:2b:04:af:6f:29:72:7a:56:b7:de:80:b5:6a:e7:9c. Are you sure you want to continue connecting […]

Read More

Piping and Redirection

skip this Piping and Redirection Piping and redirection are techniques that gives the linux command line an incredible amount of power and versatility. Piping and Redirection works by essentially controlling the flow of standard inputs and standard outputs. Piping Piping is a technique that lets you use Linux commands as […]

Read More

RHCSA – The grep command

What is grep? The grep command is for scanning through texts for a particular search term (which can be in the form of a regex string) and return all lines that meets the match. As a result grep is one of the most commonly used Linux commands. Grep essentially acts […]

Read More

Standard Outputs, Inputs, and Errors

Overview of standard Outputs/Inputs/Errors By the end of this article you should be able to answer the following questions: [expand title=”How many types of outputs can a command give out, and what are they called?” alt=” “] Two types, They are called, “standard output” and “standard error”. [/expand] Standard Outputs […]

Read More

How to create Kickstart files on CentOS/RHEL 7

Once you understand the contents of a kickstart file, it then becomes quite easy to customize it. The kickstart file is arranged into 4 sections. Configuration commands pre section for writing preinstall scripts packages section post section These sections neeeds to be declared in the same order as listed above. […]

Read More