Solved

redhat

Posted on 2004-04-14
4
429 Views
Last Modified: 2013-12-06
I get 4 cd from my friend redhat enterprise linux As , this ver sion of redhat is free or not I want to in stall it for my database sever  i afraid after ii ise 1 month it need activate key
0
Comment
Question by:teera
4 Comments
 
LVL 12

Assisted Solution

by:stefan73
stefan73 earned 100 total points
ID: 10821697
Hi teera,
It's not free, check
http://www.redhat.com/software/rhel/purchase/index.html


Cheers,
Stefan
0
 
LVL 17

Accepted Solution

by:
owensleftfoot earned 100 total points
ID: 10821732
You can get an almost identical version which is free at
http://www.whiteboxlinux.org/
0
 
LVL 1

Assisted Solution

by:hhelmich
hhelmich earned 75 total points
ID: 10823278
Or just go with Fedora Core 1 - it is free and based on RedHat technology.
0
 
LVL 3

Assisted Solution

by:tolgadalkilic
tolgadalkilic earned 75 total points
ID: 10847037
hi taera

What is your database server? Is it oracle? Otherwise you can use other linux distributions like debian, mandrake, slackware ..
Or as mentioned, use fedora.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
need to clone a white copy of a linux device 2 75
AWS CLI issues with Tags 3 63
SSH connect to Amazon Centos Instance 7 39
Centos 6 User Can't Assign Password 2 24
In my business, I use the LTS (Long Term Support) versions of Linux. My workstations do real work, and so I rarely have the patience to deal with silly problems caused by an upgraded kernel that had experimental software on it to begin with from a r…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now