

# service nfs restartĬreate a mount point to mount the share directory ‘var/unixmen_local’ which we created in the earlier step 5. Rw – Writable permission to shared folderħ. # mkdir /var/unixmen_shareĮdit file /etc/exports, # vi /etc/exportsĪdd the entry as shown below. Start NFS service # service rpcbind startĬreate a shared directory named ‘/var/unixmen_share’ in server and let the client users to read and write files in that directory. Install NFS in Client System # yum install nfs* -yĤ. Start NFS service # service rpcbind startģ.

Install NFS in Server system # yum install nfs* -yĢ. In this how-to I use two systems running with CentOS 6.5, but it will work on all CentOS / RHEL / Scientific Linux 6.x distros. You can then directly access any of the files on that remote share. NFS enables you to mount a remote share locally. NFS, Network File System, is a server-client protocol used for sharing files between linux/unix to unix/linux systems. To enable automatic updates, we need to edit /etc/apt//10periodic To blacklist a package, navigate to Package-Blacklist section and add your packages: // List of packages to not update If you want to prevent a package to being updated automatically, you can add them to blocklist. If you want to get receive updates from updates or propsed or backports, uncomment the corresponding lines.īlocklist packages from automatic updating Automatically upgrade packages from these (origin:archive) pairs $ sudo vi /etc/apt//50unattended-upgradesĪnd adjust as per your needs. To configure unattended-upgrades, we have to edit /etc/apt//50unattended-upgrades file. This file will let you to choose what updates you want to make by choosing where apt can search for new updates and upgrades. Let us install this package using command: $ sudo apt-get install unattended-upgrades The unattended-upgrades is used to automatically install updated packages, either all updates or only security updates.
