by Devin Yang
(This article was automatically translated.)

Published - 3 years ago ( Updated - 3 years ago )

There may still be some old programs in some places, which can only run the old system.
But want to be able to execute and install some desired packages,
You may try this trick

Please note that if this system is important to you, please evaluate it yourself. It is recommended that you are in a Docker environment and have a backup image before trying it.

Open file

vi /etc/yum.repos.d/CentOS-Base.repo

Replace the three contents below

[base]
[updates]
[extras]

The content is as follows:

[base]
name=CentOS-$releasever-Base
# mirrorlist=http://mirrorlist.centos.org/?release=$releasever&arch=$basearch&repo=os&infra=$infra
# baseurl=http://mirror.centos.org/centos/$releasever/os/$basearch/
baseurl=https://vault.centos.org/6.10/os/$basearch/
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6

# released updates
[updates]
name=CentOS-$releasever-Updates
# mirrorlist=http://mirrorlist.centos.org/?release=$releasever&arch=$basearch&repo=updates&infra=$infra
# baseurl=http://mirror.centos.org/centos/$releasever/updates/$basearch/
baseurl=https://vault.centos.org/6.10/updates/$basearch/
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6

# additional packages that may be useful
[extras]
name=CentOS-$releasever-Extras
# mirrorlist=http://mirrorlist.centos.org/?release=$releasever&arch=$basearch&repo=extras&infra=$infra
# baseurl=http://mirror.centos.org/centos/$releasever/extras/$basearch/
baseurl=https://vault.centos.org/6.10/extras/$basearch/
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-6

Clear

yum clean all

update

yum update

Tags: linux system config

Devin Yang

Feel free to ask me, if you don't get it.:)

No Comment

Post your comment

Login is required to leave comments

Similar Stories


security,config

Raspberry Pi fail2ban installation notes

My mainframe basically has remote logs set up, and all of them are sent to the log center on the Synology NAS. Among them, there is a Raspberry Pi that is used as a router, and there will be a bunch of sshd verification attempts to log in. Basically, I only allow public key verification, so I don’t want to use passwords to brute force it, but a bunch of logs of verification failures are really good. Hate.

ssh,security,config

About SSH_USER_AUTH

After OpenSSH 7.6, you can add the ExposeAuhtInfo yes parameter in the sshd_config configuration file, restart sshd, and then log in, there will be an environment variable $SSH_USER_AUTH which can be written into a temporary file in tmp, which contains the login public key

linux,macos

PS aux will you?

For Linux system administrators, you must understand the ps aux command. If you want to be a Linux system administrator, or you are a Linux user, you should understand this command. ps is process status For short, anyone can find out what kind of program is running on the system and how the status is executed through this command. I saw some programs that should not appear, maybe the system was hacked and used to mine🥹