SlideShare a Scribd company logo
1 of 24
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
System Administration
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Key Knowledge Areas
Provide common commands to the boot loader and options to the kernel at boot time.
Demonstrate knowledge of the boot sequence from BIOS to boot completion.
Check boot events in the log files.
System Architecture
Boot the system
Terms and Utilities
/var/log/messages
dmesg
BIOS
bootloader
kernel
init
2
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Boot Sequence
• BIOS Initialization
• Boot Loader
• Kernel initialization
• init starts and enters desired run level by executing:
 /etc/rc.d/rc.sysinit
 /etc/rc.d/rc and /etc/rc.d/rc?.d/
 /etc/rc.d/rc.local
 X Display Manager if appropriate
3
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Boot Loader Components
Boot Loader
1st Stage - small, resides in MBR or boot sector
2nd Stage - loaded from boot partition
Minimum specifications for Linux:
Label, kernel location, OS root filesystem, location of initial ramdisk (initrd)
Minimum specification for other OS:
boot device, label
4
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
GRUB and grub.conf
GRUB “the GRand Unified Bootloader”
•Command-line interface available at boot prompt
•Boot from ext2/ext3, ReiserFS, JFS, FAT, minix, or FFS file systems
•Supports MD5 password protection
/boot/grub/grub.conf
Changes to grub.conf take effect immediately
If MBR on /dev/hda is corrupted, reinstall the first stage
bootloader with: /sbin/grub-install /dev/hda
5
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Starting the Boot Process: GRUB
Image selection
•Select with space followed by up/down arrows on boot splash screen
Argument passing
•Change an existing stanza in menu editing mode
•Issue boot commands interactively on the GRUB command line
6
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Kernel Initialization
Kernel boot time functions
•Device detection
•Device driver initialization
•Mounts root filesystem read only
•Loads initial process (init)
7
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
init Initialization
init reads its config: /etc/inittab
•initial run level
•system initialization scripts
•run level specific script directories
•trap certain key sequences
•define UPS power fail / restore scripts
•spawn gettys on virtual consoles
•initialize X in run level 5
8
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Boot process for PCs:
Boot overview
1. When PC is turned on, BIOS (Basic Input Output Service) performs a selftest;
2. When machine passes self test, BIOS loads Master Boot Record;
usually from first 512-byte sector of the boot drive.
This is usually the 1st hard drive on system, may also be diskette, CD, USB key.
3. For a hard drive, MBR loads a stage 1 boot loader;
Which is either LILO or GRUB stage1 boot loader on a Linux system.
This is another 512-byte, single-sector record.
4. stage 1 boot loader loads a sequence of records called stage 2 boot loader
(or sometimes the stage 1.5 loader).
5. stage 2 loader loads the operating system.
For Linux, this is the kernel, and possibly an initial RAM disk (initrd).
9
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
When BIOS has finished starting up, it loads first sector of boot disk into memory,
and runs the code it finds there.
On a floppy disk, boot sector is the first sector, and that‘s the whole story.
Boot with floppy
10
Floppy disk boot sector (“logical” layout)Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
For hard disks, the first sector of the disk (/dev/hda) is the partition sector.
•This usually contains a program that loads the boot sector from the “active” partition.
•This first sector is known as MBR (Master boot record).
Boot with disk
11
Each partition on a hard disk has its own boot sector.Ex:
MSoft operating systems (FDISK /MBR in MSDOS) install a partition sector loader to do the following:
• Check which partition is marked as “active”.
• Load the sector from the start of that partition and run it.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Linux boot loaders have characteristics in common:
boot loaders characteristics
12
The code stored on the boot sector or the partition sector is just the first stageloader.
This means that its not responsible for loading the operating system, but only for loading boot loader into memory.
•The boot loader can be configured to load other operating systems.
- When loading other operating systems, the boot loader may load them into
memory,
- or call that operating system's own boot loader.
•Interactively enter options to be passed to the kernel to be loaded.
- Kernel options are used, to indicate where the root filesystem is (root=/dev/hda3),
- and can be used for debugging (init=/bin/sh).
Chain loading
Occurs when the boot manager that is located in the master boot record (MBR)
loads the boot loader that is in a partition boot record.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
stage 2 loaders used in LILO and GRUB allow to choose from several operating
systems or versions to load. However, LILO and GRUB differ significantly
Linux boot loaders
13
With LILO, a change to the system requires use of command to recreate LILO boot setup
whenever there’s changes to kernel or other changes to the system.
With GRUB, can accomplish changes with a configuration text file that can be edited.
With GRUB 2 also requires a rebuild from a configuration file normally stored in /etc.
During Linux installation, you will usually specify either LILO or GRUB manager.
If chosing GRUB, then you may not have LILO installed.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Installing another operating system can overwrite the MBR.
Some systems like DOS and Windows, always install their own MBR.
Recovery
14
Boot from floppy into the Linux system and rerun lilo or grub-install.
Linux distributions can also boot the Linux in recovery mode.
In recovery mode the root file system on the hard drive could not be mounted or mounted
in recovery mode.
Use chroot cmd to make the recovery mount point become the root (/) directory.
Then run lilo or grub-install to reinstall the MBR.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Recovery
15
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Recovery
16
With prompt in recovery u can create a mount point (/mnt/sysimage), mount /dev/sda6,
chroot into the mounted system. cat /etc/issue commands show effect of chroot cmd.
Ex: root@yourcomp:~# mkdir /mnt/sysimage
root@yourcomp:~# mount /dev/sda6 /mnt/sysimage
root@yourcomp:~# cd /mnt/sysimage
root@yourcomp:~# mount -t proc none proc/
root@yourcomp:~# mount -t sysfs none sys/
root@yourcomp:~# mount -o bind /dev dev/
root@yourcomp:~# cat /etc/issue
Ubuntu 9.10 n l
root@yourcomp:~# chroot /mnt/sysimage
root@yourcomp:~#
sh-3.00# chroot /mnt/sysimage
[root@yourcomp /]# cat /etc/issue
Fedora release 8 (Werewolf)
Kernel r on an m
[root@yourcomp /]# grub-install /dev/fd0
Installation finished. No error reported.
This is the contents of the device map /boot/grub/device.map.
Check if this is correct or not. If any of the lines is incorrect,
fix it and re-run the script `grub-install'.
(fd0) /dev/fd0
(hd0) /dev/sda
[root@yourcomp /]#
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Kernel parameters
17
LILO and GRUB allow to edit cmdline that is passed to kernel when it boots.
Kernel boot parameters are used to override the hardware config parameters detected by the kernel.
Ex: root@yourcomp:~# cat /proc/cmdline
ro root=/dev/hda1 apm=off
Format parameters supplied are:
- single word; - format name=value; format name=value1,value2,value3.
Each name identifies which part of the kernel receives the option.
Default kernel command line always specifies the root filesystem, mounted ro read-only
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Kernel parameters
18
Kernel cmdline Parameters used:
•single – boot into single user mode (with root password)
•emergency – boot into a shell (newer versions of init require the root password)
•1, 2, 3, 4, 5, 6 – boot into a specific runlevel.
cmdline parameters not used by kernel as environment variables to load the usual daemons,
are passed onto init process program ( /sbin/init).
bootparam(7) man page discusses the boot parameters in detail.
file /usr/src/linux/Documentation/kernelparameters.txt is a complete reference.
Ex: root@yourcomp:~# man bootparam
root@yourcomp:~# less /usr/src/linux/Documentation/kernel-parameters.txt
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Kernel parameters
19
boot parameters used:
•root=/dev/hda1: change the root filesystem during bootup
•init=/sbin/init: kernel boot will run /sbin/init.
troubleshooting parameter is init=/bin/bash which runs an interactive shell instead of /sbin/init.
•mem=32M: limit the amount of memory to specified. kernel does not attempt to check memory actually present
•Noinitrd: don't execute /linuxrc on initial root disk image supplied by boot loader.
avoid the behaviour of initial root disk loading modules required for booting (filesystem support).
•Config devices compiled in Kernel with IO and IRQ settings in format: device=irq,iobase
•rdev cmd: used to modify a kernel image to not require boot options for:
- root device (rdev /boot/vmlinuz "/dev/hda7 "),
- VGA mode (vidmode /boot/vmlinuz "788"),
- Readonly/Readwrite root filesystem (rootflags ...)
•vga=value: changes display mode of VGA adapter
VESA graphics modes support:
Color depth 640x480 800x600 1024x768 1280x1024
8 bits 256 colours 769 771 773 775
15 bits 32768 colours 784 787 790 793
16 bits 65535 colours 785 788 791 794
24 bits 16.7 Million 786 789 792 795
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Kernel parameters with LILO
20
To control booting using LILO, interrupt boot process using:
1.Press Shift: To obtain prompt, Shift before LILO begins booting if there’s no timeout specified in
lilo.conf.
2.Enter a password: lilo.conf can specify that password must be entered to change boot parameters.
LILO allows configuring the boot sequence in following ways:
1.Select kernel to boot or boot image to load: By typing it's name (press Tab to see list), or by
selecting it from a menu.
2.Add options to the kernel command line (you can't remove option that are already there)
LILO: linux root=/dev/fd0 rw init=/bin/bash
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Kernel parameters with GRUB
21
GRUB's is free cross platform, so it does not follow Linux hard disk convention naming.
(fd0) – /dev/fd0
(hd0) – /dev/hda (SCSI = sd0)
(hd0,1) – /dev/hda2 (2nd
partition of 1st
disk)
To boot Linux, it is required that GRUB knows:
1.where are the files found (root);
2.where is the kernel found (kernel);
3.where is the initial root disk (initrd), that contain vital system modules (filesystem or SCSI controller).
The boot command tells GRUB to boot.
Ex: root (hd0,0) # source of grub files is
/dev/hda1
kernel /boot/vmlinuz root=/dev/hda1 # load a kernel
initrd /boot/initrd # load an initial root disk
boot # boot up
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Kernel parameters with GRUB
22
GRUB commands that are in /etc/grub.conf, can be typed when the system boots.
Newer versions of GRUB print helpful menus, for the key-presses:
• p – enter a password
• c – start the GRUB command line (type GRUB configuration yourself)
• e – edit a GRUB configuration line
• a – modify kernel arguments before booting
• o – open a new line for configuration commands
• d – remove the selected line from the configuration
• b – boot the system
• Escape – return to the menu
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Boot the system
Boot messages
23
When Linux kernel boots, each subsystem is initialised in a predetermined order.
The messages generated by each subsystem are generally displayed on the console.
And are also recorded in 2 places:
Ex:
yourname@yourcomp~> grep "^Apr.*d:" /var/log/messages|tail -n 14
Apr 2 15:36:50 lyrebird kernel: hdd: attached ide-scsi driver.
Apr 2 15:36:26 lyrebird rc.sysinit: Setting hostname lyrebird: succeeded
Apr 2 15:36:26 lyrebird rc.sysinit: Initializing USB keyboard: succeeded
Apr 2 15:36:55 lyrebird sshd: succeeded
Apr 2 15:36:57 lyrebird crond: crond startup succeeded
Listing daemon status messages after a reboot.
1.kernel message (ring) buffer – kernel keeps 16k of messages, displayed by dmesg command.
redirect output to a file for later analysis or forward it to a kernel developer for debugging purposes
2.syslogd records timestamped kernel messages to /var/log/messages.
• After system starts /sbin/init, kernel logs events in the ring buffer,
but processes use the syslog daemon to log messages, usually in /var/log/messages.
• Each syslog line has a timestamp, and the file persists between system restarts.
This file is where you should first look for errors that occurred during the init scripts stage of booting.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Fim de sessão
24

More Related Content

What's hot

Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
wensheng wei
 
Unix(introduction)
Unix(introduction)Unix(introduction)
Unix(introduction)
meashi
 
Lpi lição 01 exam 102 objectives
Lpi lição 01  exam 102 objectivesLpi lição 01  exam 102 objectives
Lpi lição 01 exam 102 objectives
Acácio Oliveira
 
101 2.2 install boot manager
101 2.2 install boot manager101 2.2 install boot manager
101 2.2 install boot manager
Acácio Oliveira
 
Some basic unix commands
Some basic unix commandsSome basic unix commands
Some basic unix commands
aaj_sarkar06
 
101 2.3 manage shared libraries
101 2.3 manage shared libraries101 2.3 manage shared libraries
101 2.3 manage shared libraries
Acácio Oliveira
 

What's hot (20)

Linux commands
Linux commandsLinux commands
Linux commands
 
Linux Security Quick Reference Guide
Linux Security Quick Reference GuideLinux Security Quick Reference Guide
Linux Security Quick Reference Guide
 
Unix(introduction)
Unix(introduction)Unix(introduction)
Unix(introduction)
 
Linux Command Suumary
Linux Command SuumaryLinux Command Suumary
Linux Command Suumary
 
50 most frequently used unix linux commands (with examples)
50 most frequently used unix   linux commands (with examples)50 most frequently used unix   linux commands (with examples)
50 most frequently used unix linux commands (with examples)
 
Linux week 2
Linux week 2Linux week 2
Linux week 2
 
Lpi lição 01 exam 102 objectives
Lpi lição 01  exam 102 objectivesLpi lição 01  exam 102 objectives
Lpi lição 01 exam 102 objectives
 
101 2.2 install boot manager
101 2.2 install boot manager101 2.2 install boot manager
101 2.2 install boot manager
 
Unix OS & Commands
Unix OS & CommandsUnix OS & Commands
Unix OS & Commands
 
11 linux filesystem copy
11 linux filesystem copy11 linux filesystem copy
11 linux filesystem copy
 
Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013
 
Linux directory structure by jitu mistry
Linux directory structure by jitu mistryLinux directory structure by jitu mistry
Linux directory structure by jitu mistry
 
Part 2 of 'Introduction to Linux for bioinformatics': Installing software
Part 2 of 'Introduction to Linux for bioinformatics': Installing softwarePart 2 of 'Introduction to Linux for bioinformatics': Installing software
Part 2 of 'Introduction to Linux for bioinformatics': Installing software
 
Some basic unix commands
Some basic unix commandsSome basic unix commands
Some basic unix commands
 
Linux filesystemhierarchy
Linux filesystemhierarchyLinux filesystemhierarchy
Linux filesystemhierarchy
 
101 2.3 manage shared libraries
101 2.3 manage shared libraries101 2.3 manage shared libraries
101 2.3 manage shared libraries
 
Linux Introduction (Commands)
Linux Introduction (Commands)Linux Introduction (Commands)
Linux Introduction (Commands)
 
Linux Directory Structure
Linux Directory StructureLinux Directory Structure
Linux Directory Structure
 
Lesson 3 Working with Files in Linux
Lesson 3 Working with Files in LinuxLesson 3 Working with Files in Linux
Lesson 3 Working with Files in Linux
 
Linux Command Line Basics
Linux Command Line BasicsLinux Command Line Basics
Linux Command Line Basics
 

Viewers also liked

101 3.8 perform basic file editing operations using vi
101 3.8 perform basic file editing operations using vi101 3.8 perform basic file editing operations using vi
101 3.8 perform basic file editing operations using vi
Acácio Oliveira
 
Services provided by os
Services provided by osServices provided by os
Services provided by os
Sumant Diwakar
 
Operating system services 9
Operating system services 9Operating system services 9
Operating system services 9
myrajendra
 
How to install windows 7
How  to install windows 7How  to install windows 7
How to install windows 7
cmark11
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
Anusha Babooa
 

Viewers also liked (14)

Overview open source certification
Overview open source certificationOverview open source certification
Overview open source certification
 
101 3.8 perform basic file editing operations using vi
101 3.8 perform basic file editing operations using vi101 3.8 perform basic file editing operations using vi
101 3.8 perform basic file editing operations using vi
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Services provided by os
Services provided by osServices provided by os
Services provided by os
 
Operating system services 9
Operating system services 9Operating system services 9
Operating system services 9
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
 
How to install windows 7
How  to install windows 7How  to install windows 7
How to install windows 7
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
 
Functions Of Operating System
Functions Of Operating SystemFunctions Of Operating System
Functions Of Operating System
 
Php Presentation
Php PresentationPhp Presentation
Php Presentation
 
Windows 7 installation ppt
Windows 7 installation pptWindows 7 installation ppt
Windows 7 installation ppt
 
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesBooting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot images
 
OS Functions and Services
OS Functions and ServicesOS Functions and Services
OS Functions and Services
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
 

Similar to 1.2 boot the system v2

Bootloader and bootloading
Bootloader and bootloadingBootloader and bootloading
Bootloader and bootloading
Arpita Gupta
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
Dhaval Kaneria
 

Similar to 1.2 boot the system v2 (20)

101 1.2 boot the system
101 1.2 boot the system101 1.2 boot the system
101 1.2 boot the system
 
2.2 install boot manager
2.2 install boot manager2.2 install boot manager
2.2 install boot manager
 
101 2.2 install boot manager
101 2.2 install boot manager101 2.2 install boot manager
101 2.2 install boot manager
 
Linux Booting Process
Linux Booting ProcessLinux Booting Process
Linux Booting Process
 
An Insight into the Linux Booting Process
An Insight into the Linux Booting ProcessAn Insight into the Linux Booting Process
An Insight into the Linux Booting Process
 
3996234.ppt
3996234.ppt3996234.ppt
3996234.ppt
 
Bootloader and bootloading
Bootloader and bootloadingBootloader and bootloading
Bootloader and bootloading
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
 
Ch04
Ch04Ch04
Ch04
 
1.1 hardware settings v2
1.1 hardware settings v21.1 hardware settings v2
1.1 hardware settings v2
 
101 1.1 hardware settings v2
101 1.1 hardware settings v2101 1.1 hardware settings v2
101 1.1 hardware settings v2
 
Linux Booting Steps
Linux Booting StepsLinux Booting Steps
Linux Booting Steps
 
Booting
BootingBooting
Booting
 
Booting
BootingBooting
Booting
 
Booting
BootingBooting
Booting
 
101 4.3 control mounting and unmounting of filesystems v2
101 4.3 control mounting and unmounting of filesystems v2101 4.3 control mounting and unmounting of filesystems v2
101 4.3 control mounting and unmounting of filesystems v2
 
Linux booting process!!
Linux booting process!!Linux booting process!!
Linux booting process!!
 
Linux boot process – explained
Linux boot process – explainedLinux boot process – explained
Linux boot process – explained
 

More from Acácio Oliveira

More from Acácio Oliveira (20)

Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptxSecurity+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
 
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptxSecurity+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
 
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptxSecurity+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
 
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptxSecurity+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
 
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptxSecurity+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
 
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptxSecurity+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
 
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptxSecurity+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
 
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptxSecurity+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
 
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptxSecurity+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
 
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptxSecurity+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
 
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptxSecurity+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
 
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
 
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptxSecurity+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
 
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptxSecurity+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
 
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
 
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptxSecurity+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
 
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptxSecurity+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
 
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptxSecurity+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
 
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptxSecurity+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
 
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptxSecurity+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

1.2 boot the system v2