Yum in Redhat Enterprise Linux 6.1

Editor: This post is by James Antill. It looks at yum, the command line tool for managing applications on certain RPM-based Linux distributions like Redhat Enterprise Linux and Fedora.

Time to look at a few features of yum in RHEL-6.1 now that it’s released:

Search is more user-friendly – As we maintain yum we are always looking for the “minor” changes that can make a big difference to the user, and this is probably one of the biggest minor changes. As of late RHEL-5 and RHEL-6.0 “yum search” was great for finding obscure things that you knew something about but with 6.1 we’ve hopefully made it useful for finding the “everyday” packages you can’t remember the exact name of. We did this by excluding a lot of the “extra” hits, when you get a large search result. For instance “yum search kvm manager” is pretty useless in RHEL-6.0, but in RHEL-6.1 you should find what you want very quickly.

Example commands:

yum search kvm manager
yum search python url

The updateinfo command – The “yum-security” or “yum-plugin-security” package has been around since early RHEL-5, but the RHEL-6.1 update has introduced the “updateinfo” command to make things a little easier to use, and you can now easily view installed security errata (to more easily make sure you are secure). We’ve also added a few new pieces of data to the RHEL updateinfo data. Probably the most significant is that as well as errata being marked “security” or not they are now tagged with their “severity”. So you can automatically apply only “critical” security updates, for example.

Example commands:

yum updateinfo list security all
yum update-minimal --sec-severity=critical

The versionlock command – As with the previous point we’ve had “yum-plugin-version” for a long time, but now we’ve made it easier to use and put all it’s functions under a single “versionlock” sub-command. You can now also “exclude” specific versions you don’t want, instead of locking to known good specific ones you had tested. Continue reading…

Related Posts

How to dual-boot Windows 8 and Fedora 21 on a PC with UEFI firmware So Fedora 21 has been released, and my attempt to upgrade my main computer from Fedora 20 to Fedora 21 KDE failed. Since the cause is not something I ...
Autologin, passwordless login and controlling who can reboot and shutdown your computer in... Autologin and passwordless login play a critical role in the physical security posture of your computer. In KDE, they are very easy to configure. But ...
How to disabling Geo-Tagging on your phone The storage of location based data, in the form of Latitude and Longitude inside of images is called Geotagging; essentially tagging your photograph w...
Configure the graphical firewall client on Linux Mint 8 Linux Mint 8 (aka Helena) is the latest version of the popular, desktop-oriented distribution. It is based on Ubuntu 9.10, and like Ubuntu, it comes ...
How to install and configure Adobe Flash Player 10.3 on Fedora 15 Fedora 15, code-named Lovelock, does not ship with commercial applications. Which means that you are not able to install essential applications like A...
How to customize Ubuntu 10.04 desktop It's been almost a month since Ubuntu 10.04 was released. I'm not a fan of Ubuntu, but Lucid Lynx, the code name for the latest version of Ubuntu, is,...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*