Slide

  • LINUX

    LINUX:In 1969 AT&T made a decision to withdraw Multics and go with GECOS (General Electric Comprehensive Operating Supervisor / System), with AT & T in Bells Lab when Multics was withdrawn some of the programmers named Ken Thompson and Dennis Ritchie decided to rewrite operating system in order to support low cost computer..To Know More

    CLICK HERE

  • MICROSOFT

    MICROSOFT:Microsoft was established to develop and sell BASIC interpreters for the Altair 8800. It rose to dominate the home computer operating system market with MS-DOS in the mid-1980s,followed by the Microsoft Windows line of operating systems. To Know More

    CLICK HERE

  • CISCO

    CISCO:During the early 1980s, there was a married couple namely Len and Sandy Bosack who used to work in two different departments of computer located in Stanford University. This couple was facing problem in making their computers communicate with each other To Know More

    CLICK HERE

showinfo=1

Make WIN 7 Bootable USB Pen Drive



How to make Windows 7 Bootable USB
Pen drive



1)  Run command prompt (cmd). This can be done by clicking start and typing typing cmd in Windows 7. In Windows Xp, click on start and then click on run. Type cmd and run. This will open the command prompt which will look like this:









Install AD on Server 2008





This tutorial will explain how to install AD on server 2008. This will valid for windows 2008 R2 as well.
Requirement:

Minimum: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)
Minimum: 512 MB RAM
Minimum Hdd: 32 GB or greater

  • The first step is to assign a ip to the server that you going to deploy the AD. Its nessary to install it as DNS server too. So its better to have fixed ip it doesn't mean you cannot install AD without fixed ip address but it will solve lot of issues if you used fixed ip 





























  • In here the server ip is 10.0.0.14. Since we going to make it as DNS server too you should use the same ip as the preferred DNS server.

Mysql list databases





Mysql list databases

mysql is a simple command-line tool. mysql is command line and it is very easy to use. Invoke it from the prompt of your command interpreter as follows:

$ mysql

Output:


mysql>
 
You may need to provide mysql username, password and hostname, use:

$ mysql --user=your-user-name --password=your-password

mysql>

To list database type the following command

mysql> show databases;

Monitoring MySQL

Monitoring MySQL




Monitoring MySQL servers is no rocket science provided you know what to monitor. MySQL gives a comprehensive list of variables to check your server’s health and performance. Let me walk you through the crucial variables you should be monitoring. Lets assume that you have one or more MySQL servers, which have been setup and running fine. Here are the top 10 things to monitor on your MySQL.

NOTE:-  Most of the commands run on mysql prompt ( mysql>) to go to mysql prompt check the 1 post intalling MYSQL some in bash shell (#)....

1. MySQL availability

Yes, this is the first thing you should be looking at! It would not make sense to monitor your MySQL if its not even available. MySQL downtime is simply not acceptable in production. At the same time ensuring zero downtime does not guarantee maximum performance.
You can execute 


Configuring MYSQL


Configuring MYSQL


Requirements
Explanation of requirements.
  1. MySQL and MySQL-server installed on a Centos 5.x system
  2. DBA access rights to MySQL on a Centos 5.x system
Doing the Work
Basic description of what will be done and what is expected.
  1. Database file locations:
In Centos 5.x the location where the raw uncompressed MySQL databases are stored is: /var/lib/mysql
  1. Users and DBA’s (Database Admins) create, delete, manipulate:


Installing MYSQL





How to installing MySQL server on CentOS 5 x64 -

1. Login as root user to server.

2. Execute following commands from shell:

# yum install mysql mysql-server mysql-devel
This command will check system configuration and calculates the dependencies required to run Mysql. It will display the list of packages need to be installed and in the end:
……
Total download size: 35 M
is this ok [y/N]: y
Press ‘y’ like above. This will install mysql server and mysql client on your machine.

Repairing a Corrupted Table In Mysql


Repairing a Corrupted Table In Mysql


A Table name aggregator_item.MYI  got corrupted in database name rnmbase. we will now repair the Table so that replication work fine.



ERROR: - reports error in replication: Error 'Incorrect key file for table './rnmbase/aggregator_item.MYI'; try to repair it' on query. Default database: 'rnmbase'.

Solution:-

Stop mysql instance where the replication error came


# service mysqld  stop

MYSQL REPLICATION ERROR 1053


MYSQL ERROR 1053





    ERROR:- Query partially completed on the master (error on master: 1053) and was aborted. There is a chance that your master is inconsistent at this point. If you are sure that your master is ok, run this query manually on the slave and then restart the slave with SET GLOBAL SQL_SLAVE_SKIP_COUNTER=1; START SLAVE;

The error code 1053 which means as much as "server shutdown".


Backup Script


Backup Script

This backup script will backup  /root directory to /backup directory. You can change the source and destination according to your wish. Once the backup is over the report will be mailed.

# mkdir  /backup
# cd  /backup
# vi   backup.sh

When Host Your Own Website





Introduction

Web sites have proliferated greatly over the years to become a part of everyday life for many people. People use them to create Web logs of their daily lives, provide family members with a place to store their memories or to tell people of their experiences in getting things to work. The following is a typical Web site address:
www.ittables.com

Businesses originally used them primarily as a marketing tool, but later expanded them to become an important part of their operations. Many companies rely almost exclusively on their Web sites to sell their products and provide both customer and supplier support services.
The decision as to whether or not to host your own Web site can be difficult. You have to consider factors of cost and convenience as well as service and support. This chapter briefly addresses the most common issues and outlines the simple network architecture for use in a small office or home.
Not all homes require a Web site, but the process of establishing one touches many aspects of not only Linux, but information technology as well. This is about to setting up Linux servers to do the things that most businesses and homes need. It's about getting the job done. 

Understanding OSPF Neighbor Relationship


The neighbors only forms between routers in the same area.
First thing that happens when ospf forms neighbor as you start the ospf process and the router will determine its own router id


Now lets talk about how OSPF neighbor relationship forms





Step 1. Determin your own Router ID.

·         The router id is simply the router’s name in the ospf process.

The router-id will be:

·         Highest active interface ip address when ospf starts ( loopback beat physical interfaces)

The name is just an identifier for the router
As we get into the advance configuration of ospf that we really need to know the names of your router,  there’s some configuration that you will be typing in that tie directly to the names


Here’s the example
Here's the router down here, it has three interfaces

FTP Configuration


FTP (File Transfer Protocol)













FTP, the File Transfer Protocol, is one of the original network applications developed with the TCP/IP protocol suite. It follows the standard model for network services, as FTP requires a client and a server , the first implementations of FTP date back to 1971.
FTP set out to solve the need to publish documents and software so that people could get them easily from other computer systems. On the FTP server, files were organized in a directory structure; users could connect to the server over the network ,and download files from (and possibly upload files to) the server.
The Very Secure FTP Server (vsFTPd) is the only FTP server software included in the Red Hat Linux distribution , vsFTPd is becoming the FTP server of choice for sites that need to support thousands of concurrent downloads. It was also designed to secure your systems against most common attacks.

YUM Server



YUM (Yellow dog Updater Modifed) Server

The Yellowdog Updater, Modified (YUM) is an open-source command-line package-management utility for RPM-compatible Linuxoperating systems and has been released under the GNU General Public License. It was developed by Seth Vidal and a group of volunteer programmersYUM stands for Yellow dog Updater, Modified because it is based on YUP, the Yellow dog Updater. Yellow Dog is a version of Linux for the Power Architecture hardware. YUP, and later YUM, were written by the Linux community as a way to maintain an RPM-based system. If a package installation or upgrade request is made and requires the installation or upgrade of additional packages, YUM can list these dependencies and prompt the user to install or upgrade them.

YUM Server Requirements
1. vsftpd package to install rpm packages within a network.
2. Dump location to copy the contents from a RHEL CD or DVD  ie. /var/ftp/pub
3. deltarpm, python-deltarpm and createrepo packages
4. Repository file.


Using RPM To Install Packages



RPM

What is Package ?
In the generic sense, an RPM package is a container of files. It includes the group of files associated with a specific program or application, which normally includes binary installation scripts, as well as configuration and documentation files. It also includes instructions on how and where these files should be installed and uninstalled.

What is RPM?
RPM is a powerful software manager. It can install, remove, query, and verify the software on your system.Rpm is more than a Red Hat specific tool. The RPM Package Manager greatly simplifies the distribution, installation, upgradation. And removal of software on RHEL systems.Software to be installed using rpm is distributed through rpm package files, which are essentially compressed archives of files and associated dependency  information. Package files are named using the following format:

SSH login alert via email




SSH login alert via email


So lets get started!

1. Login to your server and su to root,

2. cd  /root

3. vi .bashrc

4. Scroll to the end of the file then add the following:
echo 'ALERT - Root Shell Access (YourserverName) on:' `date` `who` | mail -s "Alert: Root Access from `who | cut -d'(' -f2 | cut -d')' -f1`" you@yourdomain.com

Replace YourServerName with the handle for your actual server
Replace you@yourdomain.com with your actual email address

5. Save and Exit the File


6. Give Excute Permission (Check file permission section  Click Here )

Now logout of SSH, close the connection and log back in! You should receive an email address of the root login alert a few minutes afterwards.

Script to Replace a Word

Script to Replace a Word

This script will help you to understand how to replace a word in a file...........
Now we are going to replace "ONBOOT=no" to "ONBOOT=yes" in the file /etc/sysconfig/network-scripts/ifcfg-eth0.....
Create a file


For Latest Updates: Subscribe Now | | Test Your Knowledge, Take a Quiz now Click Here | | Site Best Viewed In Firefox

X