There is no excerpt because this is a protected post.
Search the Wiki
xterm
Provides a terminal emulator for the X Window System. Note: The xterm command is ported from the Massachusetts Institute of Technology (MIT) X Window System, Version 11, Release 6 with no functional enhancements. The xterm command does not have support for globalization. For the localized and internationalized terminal emulator, the user can use the aixterm Full Article…
ntpq
ntpq – standard NTP query program The ntpq utility program is used to monitor NTP daemon ntpd operations and determine performance. The program can be run either in interactive mode or controlled using command line arguments. Type the following command $ ntpq -pn OR $ ntpq -p Sample outputs: remote refid st t when Full Article…
Install RHEL 7.2
Red Hat Enterprise Linux (RHEL) is a Linux operating system developed by Red Hat. RHEL is mainly aimed at commercial organisations. Red Hat Enterprise Linux is available for multiple platforms including x86, x86_64, PowerPC, IBM pSeries and IBM System z (Mainframe). RHEL 7.2 is the latest version available from Red Hat (released November 2015). RHEL Full Article…
GARP Generic Attribute Registration Protocol
GARP (Generic Attribute Registration Protocol) is a local area network (LAN) protocolthat defines procedures by which end stations and switches can register and de-register attributes, such as network identifiers or addresses, with each other. Every end station and switch thus has a record, or list, of all the other end stations and switches that can Full Article…
How to Install an SSL Certificate
An SSL Certificate is a text file with encrypted data that you install on your server so that you can secure/encrypt sensitive communications between your site and your customers. After you create a CSR (certificate signing request) and purchase a certificate, our Validation team validates and processes your certificate request. Once validated, we issue your Full Article…
What does RSA stand for?
RSA encryption is a public-key encryption technology developed by RSA Data Security. The RSA algorithm is based on the difficulty in factoring very large numbers. Based on this principle, the RSA encryption algorithm uses prime factorization as the trap door for encryption. Deducing an RSA key, therefore, takes a huge amount of time and processing Full Article…
100 [UPDATED] VMWARE interview Questions and Answers pdf for Experienced Freshers
1. VMWare Kernel is a Proprietary Kenral and is not based on any of the UNIX operating systems, it’s a kernel developed by VMWare Company. 2. The VMKernel can’t boot it by itself, so that it takes the help of the 3rd party operating system. In VMWare case the kernel is booted by RedHat Linux Full Article…
VMware Admin Interview Questions & Answers.
1. VMWare Kernel is a Proprietary Kenral and is not based on any of the UNIX operating systems, it’s a kernel developed by VMWare Company. 2. The VMKernel can’t boot it by itself, so that it takes the help of the 3rd party operating system. In VMWare case the kernel is booted by RedHat Linux Full Article…
Top 15 VMWare Interview Questions
1) Mention what is VMware and what are their benefits? VMware provides different applications and software for virtualization. VMware products are categorized in two levels, desktop applications, and Server applications. It is useful for Running multiple operating systems and applications on a single computer Consolidate hardware to get vastly higher productivity form fewer servers Save Full Article…
VMWare Administrator Interviews
VMware Administrator Levels: Level 1 Engineers: Fresher’s or newbie to VMware Level 2 Engineers: Experienced VMware administrators Level 1 Engineers: Fresher’s or newbie to VMware It’s essential to be prepared with some basic OS, domain, Servers, Network and other technological or conceptual level questions as all these are required to build any Full Article…
100 REAL TIME VMWARE interview Questions and Answers List of top 100 vmware interview questions and answers,vmware tutorials for freshers beginners and experienced pdf free download. vmware interview Question
List of top 100 vmware interview questions and answers,vmware tutorials for freshers beginners and experienced pdf free download. vmware interview Questions and Answers :- 1. What is VMware and what are their Uses? 2. What is HA? 3. What are the different types of server software does VMware provides? vmware interview Questions and Answers 22. Full Article…
Interview Questions on VMware ESXi with Answers
What is a Hypervisor? It is a program that allows multiple operating systems to share a single hardware host. Each operating system appears to have the host’s processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in Full Article…
How BGP works
You need to understand that what follows is a gross simplification of BGP so you have to take it that way. BGP is actually very similar to RIP. In its core, just like RIP, it learns routes from different neighbors (in BGP called peers), adds its own routes, decides what path toward a particular destination Full Article…
Understanding RIP Routing
RIP, like all routing protocols, is designed to disseminate network information pertinent to routers. At the most basic level, routers need to know what networks are reachable and how far away they are. RIP does this, and it’s still widely used today. Remember, we said that RIP is a distance-vector protocol. The distance part is Full Article…
Understanding OSPF Routing
Open Shortest Path First is a robust link-state interior gateway protocol (IGP). People use OSPF when they discover that RIP just isn’t going to work for their larger network, or when they need very fast convergence. To understand the design needs for areas in OSPF, let’s start by discussing how OSPF works. There’s some terminology Full Article…
BGP Routing
The Border Gateway Protocol (BGP) is the routing protocol of the Internet, used to route traffic across the Internet. BGP is the path-vector protocol that provides routing information for autonomous systems on the Internet via its AS-Path attribute. BGP is a Layer 4 protocol that sits on top of TCP. It is much simpler Full Article…
Basic Interview Questions and Answers
VMWare Top Interview Questions with Answers 1) Explain about your production environment? How many cluster’s, ESX, Data Centers, H/w etc ? 2) How does VMotion works? What’s the port number used for it? ANS–> TCP port 8000 3) Prerequisites for VMotion? Ans–> 1)ESX Servers must be configured with VMkenerl ports enabled for vmotion and on Full Article…
Top 50 VMware vSphere Interview Questions Answers
Explain what is VMware? VMware, Inc. is an American company that provides cloud and virtualization software and services, and claims to be the first to successfully virtualize the x86 architecture commercially. Founded in 1998, VMware is based in Palo Alto, California. What is virtualization? Virtualization is a proven software technology that makes it possible to Full Article…
01.0.1 Environment Variables, Aliases And Shell Configuration Files
01.0.1 Environment Variables, Aliases And Shell Configuration Files customize comand prompt global configuration file is inside /etc /etc/ bash.bashrc apply to anyuser export EDITOR=”vi” export EDITOR=”nano” echo $EDITOR echo $PS1 export PS1=”\[\u@awesome]$” global configuration file inside etc/ vi bash.basrc 01.02. Modifying Bash Shell Configuration Files or profile.d/ bash folder/ ls | grep Full Article…
How to see all computers connected to a network
Try arp -a to see your computer’s current arp table. It will show only those IP addresses your computer has interacted with. Output like this (obscured a little to hide MAC addresses on my network): $ arp -a ? (10.1.168.1) at xx:xx:9e:82:ab:f6 on en1 ifscope [ethernet] ? (10.1.168.16) at xx:xx:29:d3:17:8 on en1 ifscope [ethernet] ? Full Article…
linux-sysadmin-interview-questions-1
Using the OSI model, which layer has the responsibility of making sure that the packet gets where it is supposed to go? What is the subnet mask, network address and broadcast address for the following address: 123.65.47.62/22? What command is used to show all open ports and/or socket connections on a machine? What is NAT? Full Article…
Number of Processes
ps ax | wc -l | tr -d ” ” OR ps ax | wc -l | awk ‘{print $1}’ OR ps ax | wc -l | sed -e “s: ::g”. In each case, tr or awk or sed is used to remove the undesirable whitespace. Relative speed: any one of these variants takes about Full Article…
Total Bytes in the Current Directory
If you want to know how much space the contents of the current directory take up, you can use something like the following: let TotalBytes=0 for Bytes in $(ls -l | grep “^-” | awk ‘{ print $5 }’) do let TotalBytes=$TotalBytes+$Bytes done # The if…fi’s give a more specific output in byte, kilobyte, megabyte, Full Article…
How do I count all the files recursively through directories
List folders with file count: find -maxdepth 1 -type d | sort | while read -r dir; do n=$(find “$dir” -type f | wc -l); printf “%4d : %s\n” $n “$dir”; done List folders with non-zero file count: find -maxdepth 1 -type d | sort | while read -r dir; do n=$(find “$dir” -type f Full Article…
Cloning an Encrypted Ubuntu System
Creating a System Clone: Overview So, to create a clone of an existing installed system, one simply needs to recreate the above configuration, copy all of the files to it, change some configuration files (particularly those dealing with the UUIDs of the filesystems), and make sure that grub and the initrd images are configured properly. Full Article…
linux clone encrypted drive to smaller drive
I’m going to answer the question myself, but a general note: Maybe its fastest just to start from scratch, the steps are complicated and timeconsuming! Make Backup using your favourite disk cloning/backup tool Follow the Ubuntu Wiki Article about ResizeEncryptedPartions Make sure the partitions matches exactly the size of your smaller disk (so the free Full Article…
count the number of files in a directory using WC
To count the number of files in a directory, I typically use ls directory | wc -l I found this: find DIR_NAME -type f | wc -l Explanation: -type f to include only files. | redirects find command’s standard output to wc command’s standard input. wc (short for word count) counts newlines, words and Full Article…
Count number of files within a directory in Linux (not using wc)
this is one: ls -l . | egrep -c ‘^-‘ Note: ls -1 | wc -l Which means: ls: list files in dir -1: (that’s a ONE) only one entry per line. Change it to -1a if you want hidden files too | : pipe output onto… wc: “wordcount” -l: count lines. Counting Files Full Article…
ubuntu How do I reset a lost administrative password?
By default the first user’s account is an administrative account, so if the UI is prompting you for a password it’s probably that person’s user password. If the user doesn’t remember their password you need to reset it. To do this you need to boot into recovery mode. Boot up the machine, and after the Full Article…
Recover a forgotten root password on Redhat 7 Linux Selinux system
The way on how you can reset a forgotten root password on a Linux system have not changed for many years. Resetting a root password on RHEL7 Linux system have not change much except that now we deal with SElinux and the system is now using systemd instead of init. Nevertheless, those who have already Full Article…
How do you recover the root password if you forgot it?
starting with debian woody,redhat and suse to ubuntu . UPDATE:To recover a root password on REDHAT and CentOS visit a following guide on how to recover a root password on RHEL 7 Linux. UPDATE:To recover a root password on Ubuntu visit a following guide on how to recover a root password on Ubuntu 16.04 Xenial Full Article…
How can I find mounted partitions in my machine?
Use below commands to know more about the mount points cat /etc/mtab df -h Q. What is a network mount point? A network mount is a mount point which can access network file systems like NFS, Samba, FTP, SSH, etc.
What is noatime and how does it work?
Linux records information about when files were created and last modified as well as when it was last accessed. There is a cost associated with recording the last access time. ext2/ext3 file systems have an attribute that allows the super-user to mark individual files such that their last access time is not recorded. This may Full Article…
What are the process states in Unix?
As a process executes it changes state according to its circumstances. Unix processes have the following states: Running* : The process is either running or it is ready to run . Waiting* : The process is waiting for an event or for a resource. Stopped* : The process has been stopped, usually by receiving a signal. Zombie* : The Full Article…
You’ve rebooted it, how would you find out what caused the crash?
/var/log/* remote logging how would you set this up? syslog.conf remote crashdumps how would you set this up? netdump
What is the Linux File structure (directory paths)
/ # root filesystem. /boot # Contains kernel images. And if grub is bootloader it is contained here as well. /etc # Contains configuration files. /bin # Contains system binaries. /sbin # Contains secure system binaries /lib # Contains system library files /home # user directories /opt # generally used for optional packages /usr # Full Article…
How do you run commands across 1000s of machines?
Good answers will mention some or all of the following: ssh Setting up password-less ssh for the machines, or assuming that they are already set up A command-line for loop which iterates over machines doing something Perl script also OK Stellar candidates will mention “xargs -P” which will allow them to run some commands in Full Article…
Explain the Linux boot process from power on to login prompt
System goes through POST ( Reads BIOS settings and initializes hardware ). System determines the primary boot device. System reads Master Boot Record of device. Depending on boot loader installed with either start Grub or LILO. Boot Loader determines default kernel image. Boot loader decompresses kernel image. Kernel loads modules for all the hardware and Full Article…
How to Setup network on centos 7
Setup network on centos 7 let’s start, Type “nmcli d” command in your terminal for quick identification of Ethernet cards installed in your machine. Here we have 2 interfaces named “enp0s17” and “enp0s18” . it might be different in your case ( Eg: em1 or p4p1 ). GUI Mode Recommended for beginners Step 1 » Full Article…
What is Dead Lock
Dead-Lock is occurred in multiple users Computing Environment. As we know that there is Many Number of users those are going to perform their Transactions. Dead-Lock has occurred when two or More Users are requesting for data item or for a Resource of System for example two or more users Request for the Printers at Full Article…
Differentiate between RAM and ROM?
RAM: Read / Write memory, High Speed, Volatile Memory. ROM: Read only memory, Low Speed, Non Voliate Memory. 1. When power is lost or turned off, a ROM chip will keep the information stored on it. In contrast, a RAM chip is volatile and requires a constant source of power to retain information. 2. A Full Article…
What is a default gateway?
The exit-point from one network and entry-way into another network, often the router of the network.
What is cache memory?
Cache memory is a small high-speed memory. It is used for temporary storage of data & information between the main memory and the CPU (center processing unit). Thecache memory is only in RAM.
TCP Three way handshake
The TCP three-way handshake in Transmission Control Protocol (also called the TCP-handshake; three message handshake and/or SYN-SYN-ACK) is the method used by TCP set up a TCP/IP connection over an Internet Protocol based network. TCP’s three way handshaking technique is often referred to as “SYN-SYN-ACK” (or more accurately SYN, SYN-ACK, ACK) because there are three Full Article…
What is boot strap protocol
The Bootstrap Protocol (BOOTP) is a computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server. The BOOTP was originally defined in RFC 951. BOOTP was largely replaced by the more efficient Dynamic Host Configuration Protocol (DHCP), which has more options and flexibility. However, Full Article…
IPTABLES Interview Questions
How to disable IPTABLES ? ================== # service iptables save # service iptables stop # chkconfig iptables off How To clear IP rules in IPTABLES use below commands: ===================================== # iptables -F # iptables -X # iptables -t nat -F # iptables -t nat -X # iptables -t mangle -F # iptables -t mangle -X Full Article…
YUM Interview Questions and Answers
1.What is yum ? Answer: yum is “yellow update manager” which is a front end tool for package management. All the rpm commands activity can be carried out using yum command in automated way. Yum mechanism will automatically resolve the dependencies unlike rpm commands. 2.How to install packages using yum ? Answer:yum install package_name 3.How Full Article…
LDAP Server Interview Questions And Answers
Q 1 : – Is there Graphical editors for LDAP ? Yes, Following are some GUI based tools for LDAP – GQ – Java LDAP Browser/Editor – Softerra LDAP Browser Q 2 : – What can i do if my application doesn’t speak to LDAP ? Gateway that translate one directory access protocol into another. Full Article…
Apache Interview Questions
1) What’s the command to stop Apache? kill the specific process that httpd is running under, or killall httpd. If you have apachectl installed, use apachectl stop. 2) How do you set up a virtual host in Apache? <VirtualHost www.amitmaheshwari.in> ServerAdmin admin@amitmaheshwari.in DocumentRoot /home/apache/share/htdocs/hostedsites ServerName www.amitmaheshwari.in ErrorLog /home/apache/logs/error/hostedsites/error_log TransferLog /home/apache/logs/access/hostedsites/access_log </VirtualHost> 3) What is mod_vhost_alias? Full Article…
SSH Login Without Password
1. Create an SSH Key Use the ssh-keygen command to create an SSH key. Accept all the defaults by pressing ENTER at every prompt. You’ll want to leave the passphrase empty. linuxsvr01$ ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/home/user/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same Full Article…
DNS INTERVIEW QUESTIONS ANSWERS
DNS stand for Domain Name System. ## What is the main purpose of a DNS server? DNS servers are used to resolve FQDN hostnames into IP addresses and vice versa. ## What is the port no of dns ? 53. ## What is a Forward Lookup? Resolving Host Names to IP Addresses. ## What is Full Article…
OSI model
In order to help you understand the OSI Model, I am going to briefly describe how each layer functions in a Building Automation System framework: Physical Layer- This is the media you use to communicate (RS-485/Ethernet ect). Data Link Layer– This is the subnet communication, or for example, the communication of MS/TP on a Full Article…
Find where inodes are being used
So I received a warning from our monitoring system on one of our boxes that the number of free inodes on a filesystem was getting low. df -i output shows this: Filesystem Inodes IUsed IFree IUse% Mounted on /dev/xvda1 524288 422613 101675 81% / As you can see, the root partition has 81% of its Full Article…
No space left on device – running out of Inodes
One of our development servers went down today. Problems started with deployment script that claimed that claimed “No space left on device”, although partition was not nearly full. If you ever run into such trouble – most likely you have too many small or 0-sized files on your disk, and while you have enough disk Full Article…
Understanding TCP/IP Subnets
A TCP/IP subnet is a segment of a network where all of the computers on that segment can communicate with each other without having to go through a router. The computers on the subnet will have IP addresses that are within a given range of addresses, and those addresses will all have the same network Full Article…
Data transfer time – How can I calculate how long it will take to transfer a file over LAN?
If I am sending a 1 GB file through a 1 Gb/s LAN connection, from one computer to another, how much time will it take to transfer that file? In a 1 Gbps connection, 1 Gigabit will take 1 second. Since there are 8 bits in a byte, 1 Gigabyte will take 8 times longer. Full Article…
bc
bc, for basic calculator bc takes the following options from the command line: -h, –help Print the usage and exit. -l, –mathlib Define the standard math library. -w, –warn Give warnings for extensions to POSIX bc. -s, –standard Process exactly the POSIX bc language. -q, –quiet Do not print the normal GNU bc welcome. Full Article…
Change an IP address, Gateway and DNS via CMD – Windows
Changing TCP/IP settings using the GUI property is fairly simple. If you have to change IP address settings using CMD to automate the process, here’s how to do it: To change an IP address and DNS server setting using the built-in utility in Windows called“Netsh” we’ll do the following: Run Netsh click on start then Full Article…
Configure TCP/IP from the Command Prompt – Windows
In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe. Netsh.exe is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. Netsh.exe Full Article…
Configure Static IP Address in CentOS
The following steps will show configuration of static IP address in CentOS machine. Files needed for network configuration are under /etc/sysconfig/network-scripts. So open the file with editor like nano or vi. Here I will use nano editor. After you start your server running CentOS enter root user credentials and get in. Type the command, # Full Article…
DATACENTER TIER CLASSIFICATIONS
The overall design of a datacenter is often classified as belonging to “Tier I–IV” Tier I datacenters have a single path for power and cooling distribution, without redundant components. Tier II adds redundant components to this design (N + 1), improving availability. Tier III datacenters have multiple power and cooling distribution paths but only one Full Article…
Differences between type 1 hypervisors and type 2 hypervisors.
Hypervisors use a thin layer of code in software or firmware to allocate resources in real-time. You can think of the hypervisor as the traffic cop that controls I/O and memory management. Type 1 hypervisors run directly on the system hardware. They are often referred to as a “native” or “bare metal” or “embedded” hypervisors Full Article…
how much RAM is available for our kernel?
To find out about memory use, we can look at a proc file, MemInfo. If we look at the beginning of the file, the head of it, we see it reports MemTotal. So this particular box has, like, 16 gig. Incidentally, this is the memory available when you boot Linux, you could tell it how Full Article…
You’ve got nothing but a laptop that’s been assigned a DHCP address and no other special privileges. Explain the steps you would take to discover the network topology from there
Now, this is a loaded question. Practically speaking, there is a limited amount of network that can be discovered if it’s even vaguely secure, but an engineer that’s been around the block will come up with hopefully several of the following answers. Running a ping sweep against a range of addresses. Running a packet analyzer Full Article…
Kernel Using PXE Boot
So, here’s the plan: Set up a PXE environment. Find the minimal kernel config that exhibits the issue. Create a custom initrd containing all the tools needed to detect whether an issue is there. Create a script that can be reliably used by git bisect to make it all run automatically. PXE PXE is a Full Article…
Fiber Optic Cable Types
Fiber Optic Cable Types Simplex Cable Single strand of fiber surrounded by a 900 um buffer then a layer of Kevlar and finally the outer jacket. Available in 2mm or 3mm Plenum or Riser Jacket. Plenum is stronger and made to chare in fire versus riser is made to melt in fire. Full Article…
Fiber Optic Tutorial – Commonly Used Fiber Connectors
What are Fiber Optic Cables? Fiber optic cables consist of a glass core and cladding, buffer coating, Kevlar strength members and a protective outer jacket. Fiber optic cables use light pulses as opposed to electrical signals to send information. How are Fiber Optic Cables used? Fiber optic cables can be plugged into communications equipment Full Article…
Tehnical Interview
What are all the components in a PC or Server? PC: chassi, system board, psu, cpu, ram, hdd, fans, cables, graphics card, dvd, monitor, keyboard/mouse Server: same with deduction of a extra graphics card (is one on the system board), and addition of hdd controller, possibly backplane, no cd/dvd, extra nic, double cpu, ram, psu, Full Article…
How do you execute one program from within another?
The system calls used for low-level process creation are execlp() and execvp(). The execlp call overlays the existing program with the new one , runs that and exits. The original program gets back control only when an error occurs. execlp(path,file_name,arguments..); //last argument must be NULL A variant of execlp called execvp is used when the Full Article…
What Happens when you execute a command
When you enter ‘ls’ command to look at the contents of your current working directory, UNIX does a series of things to create an environment for ls and the run it: The shell has UNIX perform a fork. This creates a new process that the shell will use to run the ls program. The Full Article…
What are the fields in the “/etc/passwd” file?
It contains all the information of the users who log into the system. It contains a list of the system’s accounts, giving for each account some useful information like user ID, group ID, home directory, shell, etc. It should have general read permission as many utilities, like ls use it to map user IDs to Full Article…
What is the difference between Swapping and Paging?
Swapping : Whole process is moved from the swap device to the main memory for execution. Process size must be less than or equal to the available main memory. It is easier to implementation and overhead to the system. Swapping systems does not handle the memory more flexibly as compared to the paging systems. Paging : Only Full Article…
What is an advantage of executing a process in background?
The most common reason to put a process in the background is to allow you to do something else interactively without waiting for the process to complete. At the end of the command you add the special background symbol, “&”. This symbol tells your shell to execute the given command in the background. Example: # cp Full Article…
What is the command for finding the highest memory occupied file in Linux?
# du –ah / | sort –n –r | head –n 1 Option Explanations :- du – estimate file space usage -a – write counts for all files, not just directories -h – print sizes in human readable format (eg. 1K 234M 2G) sort – sort lines of text files -n – compare according to Full Article…
Which daemon is responsible for tracking events on Linux system?
syslogd is responsible for tracking system information and save it to the desired log files. It provides two system utilities which provide system logging and kernel message trapping. Internet and UNIX domain sockets support enable this utility package to support both local and remote logging. Every logged message contains at least a time and Full Article…
File and Folder Permission Basics (chmod and chown) in Linux
The article below will cover the basics of permissions and ownership for linux servers and how to change both of them. To start off we’ll create a file to work with. Creating a new file can be done with the completed with the ‘touch’ command. For example, say we want to create a new file Full Article…