SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Installing Linux
step by step
Sayyed Mehdi Poustchi Amin
India – May 2013
CentOS 6.4 x86_64
Minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation

Mais conteúdo relacionado

Mais procurados

Mais procurados (8)

Arrow ecs education_cis_sise
Arrow ecs education_cis_siseArrow ecs education_cis_sise
Arrow ecs education_cis_sise
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
 
How to Secure Containerized Environments?
How to Secure Containerized Environments?How to Secure Containerized Environments?
How to Secure Containerized Environments?
 
ISACA Indonesia - AGM 2016 - CSX Liaison 2016 dgn suara
ISACA Indonesia - AGM 2016 - CSX Liaison 2016 dgn suaraISACA Indonesia - AGM 2016 - CSX Liaison 2016 dgn suara
ISACA Indonesia - AGM 2016 - CSX Liaison 2016 dgn suara
 
cyber security career guide.pdf
cyber security career guide.pdfcyber security career guide.pdf
cyber security career guide.pdf
 
VenkaSure Total Security+
VenkaSure Total Security+VenkaSure Total Security+
VenkaSure Total Security+
 
Future of Web Security Opened up by CSP
Future of Web Security Opened up by CSPFuture of Web Security Opened up by CSP
Future of Web Security Opened up by CSP
 

Destaque

Windows server 2012 failover clustering new features
Windows server 2012 failover clustering new featuresWindows server 2012 failover clustering new features
Windows server 2012 failover clustering new features
Joseph D'Antoni
 

Destaque (8)

Windows server 2012 failover clustering new features
Windows server 2012 failover clustering new featuresWindows server 2012 failover clustering new features
Windows server 2012 failover clustering new features
 
Instalasi CentOS 6.4 Pada VMWare Workstation 10
Instalasi CentOS 6.4 Pada VMWare Workstation 10Instalasi CentOS 6.4 Pada VMWare Workstation 10
Instalasi CentOS 6.4 Pada VMWare Workstation 10
 
Sql server 2012 ha dr 24_hop_final
Sql server 2012 ha dr 24_hop_finalSql server 2012 ha dr 24_hop_final
Sql server 2012 ha dr 24_hop_final
 
Wsfc basic 130720
Wsfc basic 130720Wsfc basic 130720
Wsfc basic 130720
 
Ws2012フェールオーバークラスタリングdeep dive 130802
Ws2012フェールオーバークラスタリングdeep dive 130802Ws2012フェールオーバークラスタリングdeep dive 130802
Ws2012フェールオーバークラスタリングdeep dive 130802
 
Introduction to failover clustering with sql server
Introduction to failover clustering with sql serverIntroduction to failover clustering with sql server
Introduction to failover clustering with sql server
 
Critical SQL Server Databases: Provide HA with SQL Server Failover Clustering...
Critical SQL Server Databases: Provide HA with SQL Server Failover Clustering...Critical SQL Server Databases: Provide HA with SQL Server Failover Clustering...
Critical SQL Server Databases: Provide HA with SQL Server Failover Clustering...
 
Ms sql server architecture
Ms sql server architectureMs sql server architecture
Ms sql server architecture
 

Mais de Mehdi Poustchi Amin

Mais de Mehdi Poustchi Amin (19)

Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
How to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & SigningHow to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & Signing
 
How to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSLHow to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSL
 
Virtualization
VirtualizationVirtualization
Virtualization
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Configuring RAID 1 on CentOs
Configuring RAID 1 on CentOsConfiguring RAID 1 on CentOs
Configuring RAID 1 on CentOs
 
Installing Parsix 1
Installing Parsix 1Installing Parsix 1
Installing Parsix 1
 
Installing Debian 4
Installing Debian 4Installing Debian 4
Installing Debian 4
 
Installing Mandriva 2008
Installing Mandriva 2008Installing Mandriva 2008
Installing Mandriva 2008
 
Installing Fedora 8
Installing Fedora 8Installing Fedora 8
Installing Fedora 8
 
Installing Windows2008 Server
Installing Windows2008 ServerInstalling Windows2008 Server
Installing Windows2008 Server
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Installing Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-StepInstalling Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-Step
 
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-stepInstalling RHEL 5 Linux RedHat Enterprise Edition step-by-step
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
 
Installing Linux RedHat Enterprise Edition
Installing Linux RedHat Enterprise EditionInstalling Linux RedHat Enterprise Edition
Installing Linux RedHat Enterprise Edition
 
Installing Ubuntu7.04 Linux
Installing Ubuntu7.04 LinuxInstalling Ubuntu7.04 Linux
Installing Ubuntu7.04 Linux
 
Installing Mandriva Linux
Installing Mandriva LinuxInstalling Mandriva Linux
Installing Mandriva Linux
 
Installing Windows2000 Server
Installing Windows2000 ServerInstalling Windows2000 Server
Installing Windows2000 Server
 
Installing Debian Linux
Installing Debian LinuxInstalling Debian Linux
Installing Debian Linux
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Install Linux CentOS 6 x86_64 - minimum installation