Ir al contenido principal

Montar USB en Linux

Para instalar memoria USB en Linux se realiza de la siguiente forma

How To Mount USB flash drive from Command Line
Mounting a USB flash drive in GNOME (or another Linux desktop environment) is as easy as plug and play. Yet, occasionally, you need to mount one on a server which does not run X, then you must know how to do it on the command line.
Become root.$ sudo -s

Plug in USB drive to a USB port.

Identify the correct partition name corresponding to the USB drive.
For my Debian system, it is sda, and partition

1.$ dmesg grep -i 'SCSI device'...
SCSI device sda: 3903488 512-byte hdwr sectors (1999 MB)
Alternatively,
$ grep SCSI /var/log/messages...Dec 1 11:52:26 tiger kernel: SCSI device sda: 3903488 512-byte hdwr sectors (1999 MB)
Mount the partition to an existing mount point (directory).
$ mkdir -p /mnt/myusb
$ mount -t vfat -o rw,users /dev/sda1 /mnt/myusb
users give non-root users the ability to unmount the drive.
You can verify the drive is indeed mounted as follows:
$ mount
You should see a line in the output that looks like:
/dev/sda1 on /mnt/myusb type vfat (rw,noexec,nosuid,nodev)
To retrieve the USB drive:
You must unmount the partition before physically unplugging the USB device.
$ umount /mnt/myusb
You can run the mount command again (with no argument) to verify that the volume is indeed mounted.
Unplug USB drive.

Comentarios

Entradas populares de este blog

Configurar Shorewall en CENTOS y Debian

Tomado de  http://www.com-sl.org/staticpages/index.php?page=config-shorewall-2da-parte Como   configurar un Firewall con Shorewall en dos Interfaces de Red con políticas DROP en CentOS y Debian . Autor:  Henry D. Rosado T. Correo electrónico:  bleycklinx@gmail.com Otros Datos:   Clic Aqui En este tutorial indicare como se configura un Firewall con Shorewall con políticas DROP en dos interfaces de red para CentOS y para Debian. Shorewall Shorewall  (Shoreline Firewall) es una robusta y extensible  herramienta de alto nivel para la configuración de muros cortafuego .  Shorewall  solo necesita se le proporcionen algunos datos en algunos ficheros de texto simple y éste creará las reglas de cortafuegos correspondientes a través de  iptables .  Shorewall  puede permitir utilizar un sistema como muro cortafuegos dedicado, sistema de múltiples funciones como  puerta de enlace, dispositivo de encaminamiento y servidor . Shorewall no solo le permite configurar un firewall seguro,  poderoso y rob...

PHP On Tomcat

Fue tomado de http://fabien.duminy.ifrance.com/blog/archives/2007/08/entry_14.html tomcat and php Here are the steps to run php in tomcat : Download tomcat and unzip the archive where you want (=> TOMCAT_DIR ) Create the following directories : TOMCAT_DIR /webapps/testPHP If necessary, create directory TOMCAT_DIR /common/lib (it seems, at least with tomcat 6, that the directory is no more created) Edit the file TOMCAT_DIR /conf/catalina.properties and modify the line for property shared.loader : shared.loader=${catalina.home}/common/classes,${catalina.home}/common/lib/*.jar Edit the file TOMCAT_DIR /conf/web.xml and add the lines mentionned below (see ' lines to add to web.xml of your tomcat installation ') To download quercus ( a php 5 engine written in pure java), you must in fact download resin becau...

25 Useful IPtable Firewall Rules Every Linux Administrator Should Know

Tomado de http://www.tecmint.com/linux-iptables-firewall-rules-examples-commands/ Managing network traffic is one of the toughest jobs a system administrators has to deal with. He must configure the firewall in such a way that it will meet the system and users requirements for both incoming and outgoing connections, without leaving the system vulnerable to attacks.  25 IPtables Firewall Rules for Linux This is where iptables come in handy. Iptables is a Linux command line firewall that allows system administrators to manage incoming and outgoing traffic via a set of configurable table rules. Iptables uses a set of tables which have chains that contain set of built-in or user defined rules. Thanks to them a system administrator can properly filter the network traffic of his system. Per iptables manual, there are currently 3 types of tables: FILTER – this is the default table, which contains the built in chains for:IN...