Free Search Engine Submission

How to Change the SELinux Context of a File using chcon Command

Change the SELinux Context of a File using chcon Command

Initial SELinux Context

Typically, the SELinux context of a file's parent directory determines its initial SELinux context.
selinux context
The context of the parent directory is assigned to the newly created file. This works for commands like vim, cp, and touch. However, if a file is created elsewhere and the permissions are preserved, the original SELinux context will be unchanged.
Following command is used to check SELinux Context of a file.
ls -Zd /var/www/html

Changing the SELinux context of a file

There are two commands that are used to change the SELinux context of files: chcon and restorecon.  The chcon command changes the context of the file to the context specified as an argument to the command. Often the -t option is used to specify only the type component of the context.
Now we will see the example:
[root@serverX]# mkdir /example
[root@serverX]# ls -Zd /example
drwxr -xr-x, root root unconfirned_u:object_r:default_t:s0 /example
[root@serverX]# chcon -t httpd_sys_context_t /example
[root@serverX]# ls -Zd /example
drwxr -xr-x. root root unconfined_u:object_r:httpd_sys_content_t:s0 /example
[root@serverX]# restorecon -v /example
restorecon reset /example context unconfined_u:object_r:httpd_sys_content_t:s0 -> unconfined_u:object_r:default_t:s0
[root@serverX]# ls -Zd /example
drwxr -xr-x. root root unconfined_u:object_r:default_t:s0 /example
restorecon applies the context defined by the SELinux policy to files and directories.
chcon command can change the SELinux context files, it shouldn't be used because the change my not persist.

Related Post

Basic Commands in Linux with Examples for Beginners

The GNU Bourne-Again Shell (bash) is a program that interprets commands typed in by the user. Each string typed into the shell can have up to three parts: the command, options and arguments. Each word typed into the shell is separated from each other with spaces. Commands are the name of programs that are installed on the system. Each command has its own options and arguments.
The ENTER key is pressed when a user is ready to execute a command. Each command is typed on a separate line and the output from each command displays before the displays a prompt. If a user wants to type more than one command on a single line, a semicolon ;, can be used as a command separator. A semicolon is a member of a class of characters called metacharacters that has special meaning for bash.

Examples of Simple Commands

date : The date command is used to display the current date and time. It can also be used by the superuser to set the system clock. An argument that begins with a plus sign specifies a format string for the date command.
#date
This command will show you Day, Month, Date and Hour, Minute and Second.
#date +%R
This format will show Hour and Minute like as 05:34

#date +%x
This format will show you date in digit format with sequence of Month, Date and Year like as 05/06/2018.

#passwd
The passwd command changes a user’s own password. You must enter old password before change will be allowed.

#head
The head command display the beginning of file. By default this command display 10 lines, but they have a –n option that allows a different number of lines to be specified.
Ex. head /etc/passwd
This command will show first 10 lines of file /etc/passwd.
If we want to display 20 lines of /etc/passwd file you have to execute following command.
head –n 20 /etc/passwd

#tail
The tail command displays the end of file.
Ex. tail /etc/passwd

Linux System Administrator Interview Questions and Answers for Freshers


#wc
The wc command counts lines, words and characters in a file. It can take a –l, -w, or –c option to display only the lines, words, or characters respectively.
Ex. wc /etc/passwd
This command shows the number of lines, words and characters in a /etc/passwd file.
wc –l /etc/passwd
This command shows the number of lines in a /etc/passwd file.
wc –c /etc/passwd
This command shows the number of characters in a /etc/passwd file.

#ls
The ls command is used to list the number of files in specified file.

#history
The history command displays a list of previously executed commands.

How to Change Systemd Boot Target on Linux Using systemctl Command

Selecting a systemd target

A systemd target is a set of systemd units that should be started to reach a desired state. The most important of these targets are listed in the following table.
       Target                                                              Purpose
graphical.target            System supports multiple users, graphical and text based logins
multi-user.target          System supports multiple users, text based logins only
rescue.target                  sulogin prompt, basic system initialization completed.
emergency.target          sulogin prompt, initramfs pivot and system root mounted on / read-only
It is possible for a target to be a part of another target; for-example, the graphical.target includes multi-user.target, which in turn depends on basic.target and others. These dependencies can be viewed from the command line with the following command.
#systemctl list-dependencies graphical.target | grep target
An overview of all available targets can be viewed with:
#systemctl list-units --type=target --all
An overview of all targets installed on disk can be viewed with:
#systemctl list-unit-files --type=target --all

Selecting a target at runtime

On a running system, administrators can choose to switch to a different target using the systemctl isolate command;
#systemctl isolate multi-user.target
Isolating a target will stop all services not required by that target and start any required services that have not yet been started.

Selecting a target at runtime

When the system starts, and control is passed over to system from the initramfs, systemd will try to activate the default.target target. Normally the default.target target will be a symbolic link to either graphical.target or multi-user.target.

The Red Hat Enterprise Linux 7 Boot Process Step by Step

Instead of editing this symbolic link by hand, the systemctl tool comes with two commands to manage this link: get-default and set-default.
#systemctl get-default
multi-user.target This is the default target.
#systemctl set-default graphical.target
This command is used to set default target to graphical.target

Selecting a different target at boot time

To select a different target at boot time, a special option can be appended to the kernel command line from the boot loader: system.unit=.
To boot the system into a rescue shell where configuration changes can be made without any service running, the following can be appended from the interactive boot loader menu before starting:
This configuration change will only affect a single boot, making it a useful tool for troubleshooting the boot process.

Linux System Administrator Interview Questions and Answers for Freshers

To use this method of selecting target, use the following procedure for Red Hat Enterprise Linux 7 systems:
1.       Reboot the system
2.      Interrupt the boot loader menu countdown by pressing any key.
3.      Move the cursor to the entry to be started.
4.      Press e to edit the current entry.
5.      Move the cursor to the line that starts with linux16. This is the kernel command line.
6.      Append systemd.unit=desired.target
7.      Press Ctrl+x to boot with these changes.

The Red Hat Enterprise Linux 7 Boot Process Step by Step

Modern computer systems are complex combinations of hardware and software. Starting from an undefined, powered down state to running system with a login prompt requires large number of pieces of hardware and software to work together. The following list gives a high-level overview of the task involved for physical x86_64 system booting Red Hat Enterprise Linux 7. The list of x86_64 virtual machine is a roughly the same, but some of the hardware specific steps handled in software by the hypervisor.

How to Reset the Forgotten Root Password of Red Hat Linux 7 using Commands

  1. The machine is powdered on. The system firmware runs on Power On Self Test (POST), and starts to initialize some of the hardware.
  2. The system firmware searches for a bootable device, either configured in the UEFI boot firmware or by searching for a Master boot record (MBR) on all disks, in the order configured in the BIOS.
  3. The system firmware reads from a boot loader from disk, then passes control of the system to the boot loader. 

    How to Extend Logical Volume in Redhat Linux using command line

    On a Red Hat enterprise Linux 7 system, this will typically be grub2.
  4. The boot loader loads its configuration from disk, and presents the user with a menu of possible configuration to boot.
  5. After the user has made a choice, the boot loader loads configured kernel and initramfs from disk and places them in memory. An initramfs is a gzip-ed cpio archive contains kernel modules for all hardware necessary at boot, init script, and more. On Red Hat Enterprise Linux 7, the initramfs contains an entire usable system by itself.
  6. The boot loader hands control of the system over the corner, passing in any options specified on the kernel command line in the boot loader, and the location of the initramfs in memory.
  7. The kernel initializes all hardware for which it can find a driver in the initramfs, then executes /sbin/init from the initramfs as PID 1. on Red Hat Enterprise Linux 7, the initramfs contains a working copy of systemd as /sbin/init, as well as udev daemon.
  8. The systemd instance from the initramfs executes all units for the initrd.target target. This includes mounting the actual root file system on /sysroot.
  9. The kernel root file system is switched from initramfs root file system to the system root file system that was previously mounted on /sysroot. systemd then executes itself using the copy of systemd installed on this system.
  10. systemd looks for a default target, either passed in from the kernel command line or configured on the system, then starts units to comply with the configuration for that target, solving dependencies between units automatically. systemd target is a set of units that should be activated to reach a desired system state. these targets will include at least a text based login for a graphical login screen being spawned.

What is boot, reboot and shutdown

To power off or reboot a running system from the command line, administrators can use the systemctl command.

Change Default Server Language in CentOS using i18n File

systemctl power off will stop all running services, unmount all file systems and then power down the system.
systemctl reboot will stop all running services, unmount all file systems, and then reboot the system.

How to Reset the Forgotten Root Password of Red Hat Linux 7 using Commands

Recovering the root Password in Linux using Commands step by step

One task that every system administrator should be able to accomplish is recovering a lost system root password. If the administrator is still logged in, either as an unprivileged user but with full sudo access, or as root.
There are number of methods exist to set a new root password. A system administrator could, for example, boot the system using a live CD, mount the root file system from there, and edit /etc/shadow.

How to extend Logical Volume In Linux using Commands

In Red Hat enterprise Linux 7, there is possibility to have the script that Run from the initramfs pause at certain points, provide root shell, and then continue when that shell exits.
Change root password

Procedure to Recover root Password.

  1. Reboot the system
  2. Interrupt the boot loader countdown by pressing any key.
  3. Move the cursor to the entry that needs to be booted.
  4. Press e edit the selected entry.
  5. Move the cursor to the kernel command line the line that start with the Linux16
  6. Append rd.break
  7. Press Ctrl+x to boot with changes.

To recover the root password from this point, use the following procedure

  1.  Remount /sysroot as read-write.
  2.  Switch into a chroot jail, where /sysroot is treated as the root of the file system tree.
  3.  Set a new password.

Linux System Administrator Interview Question and Answers

    4. Make sure that all unlabeled files get relabeled during boot. 
    5. Type exit twice. first will exit chroot jail, and the second will exit the initrams debug shell.
    6. At this point the system will continue booting, perform a full SELinux relabel, then reboot again.

Resetting a Lost root Password

1. Reboot your system, and interrupt the countdown in the boot loader menu.
 1.1. Send a Ctrl+Alt+Del to your system using relevant button or menu entry.
 1.2. When the boot loader menu appears, press any key to interrupt the countdown.
2. Edit the default boot loader entry (in memory) to abort the boot process just after all file systems have been mounted, but before control is handed over to systemd,then boot.
 2.1. Use the cursor keys to highlight the default boot loader entry.
 2.2. Press e to edit the current entry.
 2.3. Using the cursor keys, navigate to the line that starts with linux16.
 2.4. Press End to move the cursor to the end of the line.
 2.5. Append rd.break to the end of the line.
 2.6. Press Ctrl+x to boot using the modified config.
3. At the switch_root prompt, remount the /sysroot file systemd read-write, then use chroot to go into a chroot jail at /sysroot.
 3.1 mount -oremount,rw /sysroot
       chroot /sysroot
4. Change the root password back to redhat.

Change File Permissions in Linux using chmod Command

 4.1 password root
5. Configure the system to automatically perform a full SELinux relabel after boot. This is required since the passwd tool re-created the /etc/shadow file without an SELinux context.
 5.1 touch / .autorelabel
6. Type exit twice to continue booting your system as normal. The system will run an SELinux relabel, then reboot again by itself.

LVM concepts in Linux Administration

Logical volumes and logical management make it easier to manage disk space. If a LVM hosted file system needs more space, it can be allocated to its logical volume from the free space in its volume group and the file system can be resized. If a disk starts to fail, a replacement disk can be registered as a physical volume group and the logical volume's extents can be migrated to the new disk.
Physical devices are the storage devices used to persist data stored in a logical volume. These are block devices and could be disk partitions, whole disks, RAID arrays or SAN disks.  A device must be initialized as an LVM physical volume in order to be used with LVM. The entire device will be used as a physical volume. 
Physical Volumes (PV) are used to register underlying physical devices for use in volume groups. LVM automatically segments PVs into physical extents (PE), these are small chunks of data that act as the smallest storage block on a PV. 
Volume groups (VG) are storage pools made up of one or more physical volume. A PV can only be allocated to a single VG. A VG can consist of unused space and any number of logical volumes. 
Logical Volumes (LV) are created from free physical extents in a volume group and provide the “storage” device used by applications, users, and the operating system. LVs are collection logical extents (LE) which map to physical extents, the smallest storage chunk of a PV. By default, each LE will map to one PE.

How to Extend Logical Volume in Redhat Linux using command line

One benefit of logical volumes is the ability to increase their size without experiencing downtime. Free physical extents in a volume group can be added to a logical volume to extend its capacity, which can be used to extend the file system it contains.
Extending logical volume
There are three steps needed to extend logical volume
1. Verify the volume group has space available.
vgdisplay is used to verify that there are sufficient physical extents available for use.
Check the free PE/Size in the output. It should report a value equal to or more than the additional space required. If there is insufficient space available then extend the volume group by at least the required space.
vgdisplay command
vgdisplay command
2. Extend the logical volume.
lvextend extends the logical volume to a new size. Add the LV device name as the last argument to the command.
      lvextend -L +300 /dev/vg/cycle
This will increase the size of logical volume cycle by 300 MiB. Remember that  the “+” in front of the size, which means add this value to the existing size; otherwise, the value defines the final, exact size of the LV.
Like lvcreate, there are multiple ways to specify the size. -l generally expects physical extent values, while -L expects size in bytes or larger named values, such as mebibytes and gigabytes.
Some examples:
  • lvextend -l 150: Resize the logical volume to exactly 150 extents in size.
  • lvextend -l +150: Add 150 extents to the current size of the logical volume.
  • lvextend -l 150M: Resize the logical volume to exactly 150 MiB.
  • lvextend -l +150: Add 150MiB to the current size of the logical volume.
  • lvextend -l +50%FREE: Add 50 percent of the current free space in the VG to the LV.
3. Extend the filesystem
xfs_ growfs /mountpoint expands the file system to occupy the extended till LV. xfs_ growfs Requires the file system be  mounted while it is being Run; it can continue to be used during the reset operation.
Important Note:

How to Create Logical Volume Manager in Linux

A common mistake is to run every lvextend, but forgot to run xfs_growfs. An alternative to running the two steps consecutively is to include -r as an option with the lvextend command. This resize the file system after LV is extended.
You can verify the new size of the mounted file system.
df -h /mountpoint

How Change SELinux mode from Enforcing to Permissive and vice-versa in Linux using commands

SELinux is a set of security rules that determine which process can access which files, directories and ports. A primary goal of SELinux is to protect user data from system service that have been compromised.

SELinux Modes

  1. Enforcing Mode
  2. Permissive Mode
  3. Disabled Mode

SElinux modes image

    Enforcing Mode: SELinux actively denies access to the web server that tries to read files with the context of type tmp_t.
    Permissive Mode: Permissive mode is used to issue troubleshooting. In permissive mode, SELinux allows all interactions, even if there is no explicit rule. This mode can be used to temporarily allow access to the content that SELinux is restricting.
    Disabled Mode: In this mode, SELinux completely disabled.

    How to check current SELinux mode

    getenforce command is used to check current status of SELinux mode.

    Changing current SELinux mode

    The setenforce command modifies the current SELinux mode.
    setenforce 0 or 1
    0 means Enforcing mode and 1 means Permissive mode.

    Setting the Default SELinux mode

    The configuration file that determines what SELinux mode is at boot time /etc/selinux/config. In this configuration file you will see SELINUX=enforcing. Change SELinux mode to SELINUX=Permissive if you want to set to Permissive mode.

    Conclusion:

    1. Policy rules are obeyed and violations logged: Enforcing Mode
    2. Policy rule violations only produce log messages: Permissive Mode
    3. A reboot is required to transition to this mode: Disabled Mode
    4. Label on processes, files, and ports that determine access: Context

    What is Access Control List in Linux

    Access Control List Concept

    Access Control List means permissions restricting access to a file are limited to file owner, members of a single group, or any other. The owner of file can set ACL's on individual files or directories(folder). 

    How To View ACLs Setting

    getfacl command is used to display ACL settings on a file. Before that let me explain what is meaning of getfacl word. facl means File Access Control List. To display ACL settings on a file, use following command.
    Syntax: getfacl filename
    Example: getfacl mastet.txt
    You will see output like as below. Before watching output let me explain meaning of rwx.
    r means read permission, w means write permission and x means execute permission.
    # file: mastet.txt
    # owner: student
    # group: unity
    user: :rwx
    user: robert:---
    user: 2900:-wx
    group: r-x
    group: santra:r--
    group: 2120:rwx
    Now let me explain above example step by step.
    First Three lines that identify the file name(master.txt), owner(student) and group owner name(unity).
    Next Three lines in above example student if file owner. student has rwx permission. User robert has No Permission(---). User 2900 has -wx permission.
    Next Three lines indicates Group entries. Group-owner permissions: unity has r-x permission. Named group santra has r-- permission. GID 2120 has rwx permission.

    How To Changing ACL File Permissions

    setfacl command is used to add, modify or remove standard ACLs on files and directories. Let's see which representation of permissions are used on file.
    "r" for read, "w" for write and "x" for execute.

    How to add or modify a user ACL

    setfacl -m u:name:rw file
    setfacl means set File Access Control List for file or directory. -m means modify, u means user, name is name of owner, rw means read write  permission granted for user and file means name of file on which your want to set permission for particular user.

    How to add or modify a group ACL

     setfacl -m g:name:rw file
     -m means modify, g means group, name is name of group owner, rw means read write  permission granted for user and file means name of file on which your want to set permission for particular user.
    There are some interview questions for System Administrator which are mostly asked at the time of interview.

    How Delete an ACL

    -x symbol is used to delete ACL for particular file or directory.
    setfacl -x u:name file

    Controlling default ACL file permission

    A directory have default ACLs set on it that are automatically accessed by all new files and new sub directories
    Example:
    setfacl -m d:u:name:rx directory
    This adds a default named user d:u:name with read-only permission and execute permission on directories. d symbol indicates default ACLs setting on particular file or directory.

    Deleting default ACLs

    Deleting a default ACL is also same as deleting a standard ACL, -x used to remove default ACL settings on file.

    How to Set cron job in Linux Server step by step

    What is crontab?
    The crontab is a list of commands that run on a regular schedule, means crontab executes task on specified time. Crontab word combines from "cron table" because it uses for a job scheduler to perform some task. The crontab command creates a crontab file containing commands and instructions for the cron daemon to execute. Normal users can use the crontab command to manage their jobs. This command can be called in four different ways:
    Command
    Intended use
    crontab  -l
    List the job for current user.
    crontab  -e

    Edit jobs for the current user.
    Crontab  -r
    Remove all jobs for the current user.
    Crontab <filename>
    Remove all jobs, and replace with the jobs read from <filename>. If no file is specified, stdin will be used.

    Each entry in a crontab file consists of six fields, specifying in the following order:
    The fields are separated by spaces or tabs. The first five fields are integer patterns and the sixth field is the command to execute. The following table briefly describes each of the fields:

    Sequence of Commands

    Job Structure

    Each job consist of six fields detailing when and what should be executed. When first five fields of match the current date and time, then in the last field will be executed. Now we go with these fields step by step.
    1. Minute  2. Hours  3. Day-of-Month   4. Month   5. Day-of-Week    6. Command
    Field       Value     Description
    minute     0-59     The exact minute that the command sequence executes
    hour        0-23     The hour of the day that the command sequence executes
    day          1-31     The day of the month that the command sequence executes
    month     1-12     The month of the year that the command sequence executes
    weekday     0-6     The day of the week that the command sequence executes (Sunday = 0, Monday = 1, Tuesday = 2, and so forth)
    command     Special        The complete sequence of commands to execute. The command string must conform to Bourne shell syntax. Commands, executable (such as scripts), or combinations are acceptable.
     
    Important Note: When "Day-of-Month" and "Day-of-Week" fields are both other than * (* indicates all valid), then the command will be executed when either of these two fields match. HR mostly asks following interview question for fresher.

    Linux System Administrator Interview Questions and Answers for Freshers

    cron job Exmples:

    0    5    3   10    *   /usr/local/bin/report
    Execute the command /usr/local/bin/report at exactly 5 a.m, on March 10th, every year.

    */10   10-22   *    Aug    3  echo "Send this Email"
    Send an email containing the word "Send this Email" to the owner of this job, every ten minutes between 10 a.m. and 10 p.m. (Please clear this 22 means 10 o'clock at night, please refer above table) on every March (3 means March) in August.

    Linux System Admin Interview Questions and Answers

    Following is the list of some interview question ans their answers within one word. System Administrator must know these answers to crack interview.
    Accessing the Command Line
    1: The interpreter that executes commands typed as strings.
    Ans: Shell
    2. The visual cue that indicates an interactive shell is waiting for the user to type a command
    Ans: Prompt
    3. The name of a program to run
    Ans: Command
    4. An interface that provides a display for output and a keyboard for input to a shell session
    Ans: Terminal
    5. Jump to the beginning of the previous word on the command line
    Ans: ctrl+Left Arrow
    6. Separate commands on the same line
    Ans: ;
    7. Clear from the cursor to the end of the command line
    Ans: ctrl+k
    8. Re-execute a recent command by matching the command line
    Ans: !string
    9. Shortcut used to complete commands, file names, and options
    Ans: Tab
    10: Re-execute a specific command in the history list
    Ans: !number
    11. Jump to the beginning of the command line
    Ans: ctrl+a
    12. Display the list of previous commands
    Ans: history

    Creating, Viewing , and Editing Text Files
    1. Display command output to terminal, ignore all errors
    Ans: 2>/dev/null
    2. Send command output to file; errors to different file
    Ans: >file 2>file2
    3. Send output and errors to the same new, empty file
    Ans: &>file
    4. Send output and errors to the same file, but preserve existing file content
    Ans: >>file 2>&1
    5. Run a command, but throw away all possible terminal displays
    Ans: &>/dev/null
    6. Send command output to both the screen and a file at the same time
    Ans:  | tee file
    7. Run command, save output in a file, discard error messages
    Ans: > file 2> /dev/null

    Storing Logs
    1. Most syslog messages are logged here. The exceptions are messages related to authentication, email processing, and that periodically run jobs, or those which are purely debugging-related
    Ans: /var/log/messages
    2. The log file for security and authentication-related messages and errors
    Ans: /var/log/secure
    3. The directory to which rsyslog is writng all the log files
    Ans: /var/log
    4. The log file with mail server-related messages
    Ans: /var/log/maillog
    5. The log file related to periodically executed tasks
    Ans: /var/log/cron
    6. Messages related to system startup are logged here
    Ans: /var/log/boot.log

    Managing Files from the Command line
    1. This directory contains static, persistent system configuration data
    Ans: /etc
    2. This is the system’s root directory
    Ans: / 
    3. User home directories are located under this directory
    Ans: /home 
    4. This is the root account’s home directory
    Ans: /root 
    5. This directory contains dynamic configuration data, such as FTP and websites
    Ans: /var 
    6. Regular user commands and utilities are located here
    Ans: /usr/bin 
    7. System administration binaries, for root use, are here
    Ans: /usr/bin 
    8: Temporary files are stored here
    Ans: /tmp 
    9. Contains dynamic, non-persistent application runtime data
    Ans: /run 
    10. Contains installed software programs and libraries
    Ans: /usr

    Managing Files using Directory
    1. Return to the current user’s home directory
    Ans: cd
    2. Determine the absolute path name of the current location
    Ans: pwd 
    3: Return to the most pervious working directory
    Ans: cd –
    4. Move up two levels from the current location
    Ans: cd ../..
    5. List the current location (long format) with hidden files
    Ans: ls –al
    6. Move to the binaries location, from any current location
    Ans: cd /bin
    7. Move up to the parent of the current location
    Ans: cd ..
    8. Move to the binaries location, from the root directory
    Ans: cd bin

    Important Linux Directories and Purposes

    1. /usr : Installed software, shared libraries, include files, and static read-only program data. in this main directories some sub-directories included.
        1.1 : /usr/bin : User commands
        1.2 : /usr/sbin : System Administration Commands.
        1.3 : /usr/local : Locally Customized Software

    2. /etc : Configuration files specific to this system.

    3. /var : Variable data specific to this system that should persist between boots. Files that dynamically change such as database, cache directories, log files, printer-spooled documents and website content may be found under this directory.

    4. /tmp : A world-writable space for temporary files. Files which nave not been accessed, modified of changed for 10 days are deleted from this directory automatically. There is another temporary directory exist, /var/tmp, in which files that have not been accessed, changed, of modified in more than 30 days are deleted automatically.

    5. /dev : Contains special device files which are used by the system to accessed hardware.

    6. /boot : Files needed in order to start the boot process.

    7. /root : This is home directory for the administrative superuser, root.

    8. /home : Home directives where regular users store their personal data and configuration files.

    9. /run : Runtime data for processes started since the last boot. This include process ID files and lock files, among other things. The content of this directory are recreated on reboot.

    System Administrator must know location of file to execute accurate command on command prompt.

    Directory Purpose

    This directory contains static, persistent system configuration data. :- /etc
    Contains installed software programs and libraries : - /usr
    Temporary files are stored here : - /tmp
    System administration binaries, for root use are here : - /usr/sbin
    This is the root account's home directory :- /root
    This is the system's root directory :- /
    User home directory are located here:- /home
    This directory contains dynamic configuration data, such as FTP and websites :- /var
    System administration binaries, for root use, are here :- /usr/sbin
    Regular user commands and utilities are located here :- /usr/bin

    How to disable GOOGLE AUTHENTICATOR in plesk panel

    Follow to below steps to disable Google Authenticator
    1. Login to Plesk panel >> File Manager>> wp-content >> Plugins >> rename google authentication as google authentication_disabled.
    You will see google-authenticator in File Manager of Plesk Panel.
    Now rename google-authenticator as google-authenticator-disabled
    Please check now your Google Authenticator should be disabled successfully.

    Related Posts

     
     

    घर बैठे ऑनलाइन पैसे कमाने के 25 आसान तरीके

    घर बैठे ऑनलाइन पैसे कमाने के 25 आसान तरीके
    घर बैठे ऑनलाइन पैसे कमाने के 25 आसान तरीके

    Most Reading

    Cpanel Hosting