Monday, October 19, 10:28
Home how To EPEL Repository on RHEL 8 - CentOS 8 Linux distributions

EPEL Repository on RHEL 8 - CentOS 8 Linux distributions

EPEL Repository 8: Although it's been a while since its release Red Hat Enterprise Linux 8, the corresponding version of the EPEL repository (Extra Packages for Enterprise Linux or EPEL Repository) was released a few days ago.

The repository contains packages not provided by official software sources, such as extundelete, a utility for recovering deleted files from ext3 / ext4 file systems.

Below we will see how you can add EPEL Repository to RHEL 8 but also to 8 CentOS, when released with the good.

EPEL Repository

Activating it EPEL Repository (EPEL8) on RHEL 8 / CentOS 8 is very simple:

all you have to do is download and install the configuration package that contains the repository files. Μwe can use the dnf package manager:

sudo dnf install

With the dnf command above we gave the package URL (in this case we used the https protocol). We ran the command and received the download and confirmation functions.

If we confirm by typing "y" and pressing enter, the package will be installed. To see where the files are installed, we can run the following command:

sudo rpm -ql epel-release

Once you have EPEL installed and activated, you can see the packages it contains.

Once again, all we have to do is use dnf by providing the repo_id of the repository we want to inspect, "epel" in our case:

sudo dnf repository-packages epel list


Please enter your comment!
Please enter your name here

In a world without fences and walls, who needs Gates and Windows


Hackers use Basecamp for phishing and malware attacks

Phishing attacks have begun exploiting Basecamp in an attempt to distribute malware and steal credentials. The Basecamp ...

DDoS attack disrupts the operation of schools in Massachusetts!

Distance learning in schools in Massachusetts has been suspended following a DDoS attack. Sandwich Public Schools faced for a week ...

Google: DDoS 2,54 Tbps Attack from China in 2017!

The Google Cloud team revealed at the end of last week that it was attacked by DDoS in September 2017, which had ...

ThunderX ransomware: Rename and data leak site works!

ThunderX ransomware changed its name to "Ranzy Locker" and the data leak site "Ranzy ..." started operating last week.

Instagram: How to change your profile fonts

While Instagram lets you use nine different fonts in your stories, you're stuck with the boring sans serif. See how ...

Global Privacy Control (GPC): Helps Protect Your Internet Privacy

Some technology companies have joined forces to create the Global Privacy Control (GPC), a new standard to ...

Microsoft Outlook: How to edit emails you receive from third parties?

The subject and text of an email we receive is usually the sender's business. He decides what ...

How to download your own videos from YouTube

YouTube makes it easy to upload videos. Downloading them is another story. See how you can download any video you have ...

Apple Watch: How do you delete notifications from your "smart" watch?

The Apple Watch, the "smart" watch presented by Apple in 2014, is a device that has untied the hands of many ...

Americans secretly use the passwords of their ex-partners

Many people tend to give the passwords of their social media and other accounts to their other half, most likely to show ...