Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Oracle Linux Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Oracle Linux Cookbook

Oracle Linux Cookbook

By : Erik Benner, Erik B. Thomsen, Jonathan Spindel
5 (4)
close
close
Oracle Linux Cookbook

Oracle Linux Cookbook

5 (4)
By: Erik Benner, Erik B. Thomsen, Jonathan Spindel

Overview of this book

Discover the power of Oracle Linux 8, the free and enterprise-grade Linux distribution designed for use in any environment, with this recipe-style book. Starting with instructions on how to obtain Oracle Linux for both X86 and ARM-based platforms, this book walks you through various installation methods, from running it as a Windows service to installing it on a Raspberry Pi. It unravels advanced topics such as system upgrades using Leapp for major version transitions and using a PXE server and kickstart files for more advanced installations. The book then delves into swapping kernels to take advantage of Oracle’s UEK, exploring boot options, managing software with DNF, and achieving high availability. Detailed recipes involving security topics will assist with tasks such as data encryption, both at rest and in motion. For developers, it offers guidance on building RPM files, using Docker and Podman in a containerized environment, working with AppStreams, and more. For large-scale deployments, the book introduces Oracle Linux Automation Manager for enterprise-level Ansible utilization, from setting up the Ansible server to basic playbook writing. Finally, you’ll discover strategies for cloud migration. By the end of this book, you’ll possess a comprehensive toolkit that will elevate your skills as a Linux administrator.
Table of Contents (16 chapters)
close
close

Playing with UEFI

One way hackers can compromise systems is by attacking the system before it boots. In order to prevent this, you must secure the operating system by enabling security in UEFI. In other words, you cannot run software if it cannot be trusted to execute code correctly because untrusted software can tamper with your bootloader or, even worse, compromise your firmware. To solve this, a new, secure method is required to boot systems, called UEFI. UEFI is implemented in the firmware and has become the interface between your hardware and the operating system, replacing the legacy BIOS firmware that was previously the industry default. A feature of UEFI is Secure Boot, which ensures that your system boots by only using software trusted by the hardware manufacturer of your system. In addition, it provides a verification mechanism (by verifying each piece of boot software by using cryptographic checksums and signatures) to ensure that the code that is launched is trusted by...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY