Solved

How to set-up the services on linux?

Posted on 2012-03-12
4
414 Views
Last Modified: 2012-03-26
Hi,

Can anyone give me the detailed steps about how can I install/set-up/configure my CentOS 6.0 with the following services:

1. Remote shell
2. FTP service allowing non-anonymous access
3. Web service(s) with CGI support
4. Samba Server
5. Password protected web pages

Kindly provide me the step-by-step information if possible as I am very new to linux.

Thanks
0
Comment
Question by:searchsanjaysharma
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 11

Expert Comment

by:legolasthehansy
ID: 37710973
Remote Shell - Use ssh (service sshd start; chkconfig sshd on)
FTP service - Use Vsftpd (service vsftpd start; chkconfig vsftpd on)
Web service - Use httpd (service httpd start; chkconfig httpd on)
Samba - You need to setup a share so that samba exports it.
vi /etc/samba/smb.conf
[share name]
path = /home/my_path ;just an example
Password protected web pages need to setup in httpd; you can create a file like .htpasswd under /var/www/html and add users to it like
htpasswd -cm username password ;to create the htpasswd file and add username
htpasswd -m username2 password2 ; to add username2 to htpasswd file

There are lot more steps but these are just a start..
0
 
LVL 44

Expert Comment

by:Darr247
ID: 37711984
The first think I would recommend is doing
# yum update
which should take your server to v6.2 instead of 6.0.
0
 
LVL 5

Accepted Solution

by:
1ly4me earned 500 total points
ID: 37713623
It seems like you are trying to setup a Lab environment for RHCE/RHCSA.

Refer my site, I have posted blogs related to what do you want.
www.asklinux.info

Thanks
Rajan
0
 

Author Closing Comment

by:searchsanjaysharma
ID: 37764593
ok
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux MD5 Hash 7 97
How to use IFS to get output of range in comma separator in bash? 2 77
Zimbra and Renewing SSL Certficate 9 62
How many users could squid support? 21 61
There are many Password Managers (PM) out there to choose from. PM's can help with your password habits and routines, but they should not be a crutch you rely on too heavily. I also have an article for company/enterprise PM's.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question