Beyond mounting a le system via NFS on a remote host, a number of different options may be
specied at the time of the mount that can make it easier to use. These options can be used with
manual mount commands, /etc/fstab settings, and autofs, and other mounting methods.
The following options are the most popular for NFS mounts:
. hard or soft . species whether the program using a le via an NFS connection should stop
and wait (hard) for the server to come back online if the host serving the exported le system is
unavailable, or if it should report an error (soft).
If you specify hard, you will not be able to terminate the process waiting for the NFS communication
to resume unless you also specify the intr option.
If you specify soft, you can set an additional timeo=
ç
value
è
option, where
ç
value
è
species
the number of seconds to pass before the error is reported.
. intr. allows NFS requests to be interrupted if the server goes down or cannot be reached.
. nolock . is occasionally required when connecting to older NFS server. To require locking, use
the lock option.
. noexec . does not permit the execution of binaries on the mounted le system. This is useful if
your Red Hat Linux system is mounting a non-Linux le system via NFS that contains binaries that
will not execute on your machine.
. nosuid. does not allow set-user-identier or set-group-identier bits to take effect.
. rsize=8192 and wsize=8192.may speed up NFS communication for reads (rsize) and writes
(wsize) by setting a larger data block size, in bytes, to be transferred at one time. Be careful when
changing these values; some older Linux kernels and network cards may not work well with larger
block sizes.
. nfsvers=2 or nfsvers=3. specify which version of the NFS protocol to use.
Many more options are listed on the mount man page, including options for mounting non-NFS le
systems.
Why We Use Web Directories?

The Web directories like a force in the internet and can give your website extreme boost on internet. Many new web directories are not know by the mass users of the internet, but this is likely to change as the web directory becomes a respected and highly visited site.
Many new web directories do not require a back link which is great thing for building up web presence and search engine ranking recently Google and the other major search engines have edited their algorithms as to not place as much emphasis n reciprocal links. The Web directory can become full with hundreds of sites advertising on a single page.
Changing Permissions (chmod)
The access rights for any given file can be modified by using
the change mode (chmod) command.
To change the access rights
You must specify the following three elements:
The level (owner level, group level, or other
level) to modify.
The permission (read, write, or execute) to modify.
The file files to modify.
Level Options
Table below lists the level options that can be used with the
chmod command.
Option Level Description
u Owner Owner of a file
g Group Group to which the user
belongs
0 Other All other users
a All Can replace u, g, or o
the change mode (chmod) command.
To change the access rights
You must specify the following three elements:
The level (owner level, group level, or other
level) to modify.
The permission (read, write, or execute) to modify.
The file files to modify.
Level Options
Table below lists the level options that can be used with the
chmod command.
Option Level Description
u Owner Owner of a file
g Group Group to which the user
belongs
0 Other All other users
a All Can replace u, g, or o
Linux File and Directory Permission Types
File Permission Type
READ Enables users to open files and read its
contents using;more, cat, grep, sort, view.
WRITE Enables users to open a file and change its
contents using:vi, word, >
EXECUTE Enables users to execute files as commands
Directory Permission Type
READ Users can view filenames in the directory
WRITE Users can create, delete files in the directory.
EXECUTE Users can search in the directory and change
to it using the cd command.
READ Enables users to open files and read its
contents using;more, cat, grep, sort, view.
WRITE Enables users to open a file and change its
contents using:vi, word, >
EXECUTE Enables users to execute files as commands
Directory Permission Type
READ Users can view filenames in the directory
WRITE Users can create, delete files in the directory.
EXECUTE Users can search in the directory and change
to it using the cd command.
Subscribe to:
Posts (Atom)