04-15-2009
Is sda1 the 40GB HD? The external drive is generally not more secure than the internal one; in some ways its less secure (if someone has physical access to it, they can install their own software on it by booting it off their laptop, for instance).
Is it more secure to have a /boot partition? Well, only marginally, and only if you don't mount it during run-time (which many distributions automatically do).
10 More Discussions You Might Find Interesting
1. Red Hat
Hi ,
I have two disk installed with Linux(disk 1) and WinXP(disk 2) .Now i am changing Hardisk jumbper manualy to get in to Linux/Windows .I want to configure my REDHAT linux boot manager to list Linux and WindowXP and wanna boot according to my choice .
Here is what my fdisk -l shows (Only... (2 Replies)
Discussion started by: gkrishn
2 Replies
2. Shell Programming and Scripting
Hi ,
I have a situation.
Need is to create & send a formatted file with header in BOLD & colored & some sequel results as a content.
I know echo -e \033 command, but its scope is limited in PUTTY.
How to retain the formatting out of Putty; say after someone opens a email attachment... (2 Replies)
Discussion started by: infaWorld
2 Replies
3. Solaris
I have created a pool named earthpool using zpool command. Later I created a file system named earth using zfs command. I changed the mountpoint of earth (file system) using
zfs set mountpoint=/earth earthpool/earth.
Where /earth is a directory created in root using mkdir.
Now, I have a... (8 Replies)
Discussion started by: bharu_sri
8 Replies
4. UNIX for Dummies Questions & Answers
Hi all,
I am newbie here.I want to know what is MBR,boot loader & boot strap programe.
What is procedure of loading OS in to memory.
Thanx in advance:) (1 Reply)
Discussion started by: vishwasrao
1 Replies
5. UNIX for Dummies Questions & Answers
I'm talking about boot process in multi-boot Linux perceptive.
Please tell me whether my explanation is right or wrong? If wrong, please explain.
"The BIOS checks the system and loads this initial bootstrapping code into
memory. This initial bootstrap code searches for an active partition... (0 Replies)
Discussion started by: f.ben.isaac
0 Replies
6. SCO
hi
How can I backup MBR an Partition Table of SCO 5.0.6? (7 Replies)
Discussion started by: ccc
7 Replies
7. Boot Loaders
I tried to install another Linux O.S along with MS and to make two Linux's and one windows.Usually when I try this GRUB losses the ability to boot the first Linux install. It did it again. I would really like to get this first install bootable again.
Here are some facts.
-I have a rescue... (0 Replies)
Discussion started by: theKbStockpiler
0 Replies
8. Solaris
hi all
while formatting hard disk i am getting following error.
Partition 1 ends at 266338338
It must be between 34 and 143374704.
label error: EFI Labels do not support overlapping partitions
Partition 8 overlaps partition 1.
Warning: error writing EFI.
Label failed.
I have formatted the... (2 Replies)
Discussion started by: nikhil kasar
2 Replies
9. Linux
Hi,
I have a server booted into sysresccd (mini-linux OS) with 1 40 GB disk attached
I am trying to create a volume group and restore another server into the new one
However, when I try to create a partition for /boot it seems that my VG in LVM is not recognized anymore
These are the... (2 Replies)
Discussion started by: galuzan
2 Replies
10. Red Hat
Hello All,
I have a Red Hat Linux 5.9 Server installed with one hard disk & 2 Partitions created on it as follows,
/boot - Linux Partition & another is
LVM - One VG & under that 5-6 Logical volumes(var,opt,home etc).
Here my requirement is to take out 1GB of space from LVM ( Any logical... (5 Replies)
Discussion started by: gr8_usk
5 Replies
LEARN ABOUT SUNOS
delete-acl
asadmin-delete-acl(1AS) User Commands asadmin-delete-acl(1AS)
NAME
delete-acl - removes the access control list file
SYNOPSIS
delete-acl --user admin_user[--password admin_password][--host localhost] [--port 4848][--passwordfile filename][--secure|-s][--instance
instance_name] acl_ID
Gets the access control lists associated with the named server instance..
OPTIONS
--user administrative user associated for the instance.
--password administrative password corresponding to the administrative user.
--host host name of the machine hosting the administrative instance.
--port administrative port number associated with the administrative host.
--secure indicates communication with the administrative instance in secured mode.
--passwordfile file containing passwords appropriate for the command (e.g., administrative instance).
--instance name of the instance.
OPERANDS
acl_ID internal name for the ACL file listing. This ID is used in a virtual server element to define the ACL file used by
the virtual server.
Example 1: Using delete-acl
asadmin> delete-acl --user admin --password adminadmin --host fuyako --port 7070 --instance server1 sampleACL
Deleted ACL with id = sampleACL
Where: sampleACL is the ACL that is deleted.
EXIT STATUS
0 command executed successfully
1 error in executing the command
INTERFACE EQUIVALENT
Access Control List page
asadmin-create-acl(1AS), asadmin-list-acl(1AS)
J2EE 1.4 SDK March 2004 asadmin-delete-acl(1AS)