Skip to main content

Posts

Showing posts from 2014
How to mount Windows share on Fedora using CIFS? Solution:- # mount.cifs //Server-IP-Address/Share-name /mnt/share-name -o user=username,sec=ntlm   After executing the above command, we will get a prompt for password, provide your password to proceed further  

FTP Server Configuration and User Isolation in IIS - Windows 7 & Windows Server 2008

FTP Server Configuration and User Isolation in IIS 6/7.5 - Windows 7 & Windows Server 2008 Here I am briefing some simple steps to configure FTP server with user isolation for data security, 1. Go to Internet Information Services (IIS) Manager, 2. Right click on sites on "Sites" and select "add ftpsite"from the drop down, 3. Fill details like, FTP site name: test Physical : any designated local directory (Eg:- K:\ftproot) and click Next, 4. Configure binding and ssl settings as shown below, 5. Configure authorization and authentication information as shown below, Select authentication type as "basic" and click on finish.

How to change username and home directory in Ubuntu

Here I am listing the steps in order to change the username and home directory of a a user in Ubuntu, Step-1 We need to check that if the username that we are going to change has been used by any of the system processes, if any we have to kill them first, #  killall -u "Present Username" Step-2 Once we flushed all the running services behalf of the User, we need to execute the below command in order to take effect the changes, # usermod -l "New Username" "Present Username" Note: You will get a list of useful functions about usermod by typing $man usermod command Step - 3 This time we are going to change the group name associated with the user, #groupmod -n "New Username" "Present Username" Step - 4 In order to complete these settings we need to change the name of the user home directory, #  usermod -d /home/new -m new where the "new" will be our New Username Step -5 The...

What's the difference between full, differential and incremental backups

Full Backup (or Reference Backup) When you set the Backup Type setting to Full, all the files and folders on the drive are backed up every time you use that file set. To set the backup type, click Options on the Settings menu, and then click the Backup tab.  Example: In Backup, click the drives, files, or folders to back up, and then click Next Step. Click the destination (where you want the files backed up to). On the Settings menu, click Options, click the Backup tab, click "Full: backup of all selected files," and then click OK. On the File menu, click Save As and name your backup set. Once saved, click Start Backup. Provide a name for the selected drive, files, or folders in the Backup Set Label dialog box, and then click OK. Advantages: All files from the selected drives and folders are backed up to one backup set. In the event you need to restore files, they are easily restored from the single backup set. Disadvantages: A full backup is more time co...

Understanding FSMO Roles in Active Directory

Windows 2000/2003 Multi-Master Model A multi-master enabled database, such as the Active Directory, provides the flexibility of allowing changes to occur at any DC in the enterprise, but it also introduces the possibility of conflicts that can potentially lead to problems once the data is replicated to the rest of the enterprise. One way Windows 2000/2003 deals with conflicting updates is by having a conflict resolution algorithm handle discrepancies in values by resolving to the DC to which changes were written last (that is, "the last writer wins"), while discarding the changes in all other DCs. Although this resolution method may be acceptable in some cases, there are times when conflicts are just too difficult to resolve using the "last writer wins" approach. In such cases, it is best to prevent the conflict from occurring rather than to try to resolve it after the fact. For certain types of changes, Windows 2000/2003 incorporates methods to prevent con...

Linux Filesystem Tree Overview

Ubuntu (like all UNIX-like systems) organizes files in a hierarchical tree, where relationships are thought of in teams of children and parent.  Directories  can contain other directories as well as  regular files , which are the "leaves" of the tree.  Any element of the tree can be references by a  path name ; an  absolute path name  starts with the character  /  (identifying the  root directory , which contains all other directories and files), then every child directory that must be traversed to reach the element is listed, each separated by a  /  sign. A  relative path name  is one that doesn't start with  / ; in that case, the directory tree is traversed starting from a given point, which changes depending on context, called the  current directory . In every directory, there are two special directories called  .  and  .. , which refer respectively to the directory itself, and to its p...

How to backup your MySQL database with phpMyAdmin

Backing Up Your MySQL Database To manage your MySQL database, you'll first need to login to the online manager (phpMyAdmin). After you are logged into the online manager, click on a database or table in the left frame as shown in this example: The properties for this database or table will be displayed. Then on the menu, click  Export : This interface will generate a backup file that can be used to recreate your database or table (it's actually just a file containing standard SQL statements). To save the backup, you will need to check the box marked  Save as file , so that phpMyAdmin will prompt you to download the resulting backup file. You can also change the name of the backup file and the compression--though the defaults are both fine if you would rather not change anything. If you do choose to use compression this will allow you to have a smaller backup file on your desktop if you are planning to keep it as a personal archive. The recommended setting...

Vlan Trunking(VTP) and IP Access List Configuration in Cisco 3560 Layer 3 Switch

New Network Infra Setup - TTP Requirements, VLANS One layer 3 switch One layer two switch VLANS VLANS 192.168.10.0/24 - For RAD 192.168.20.0/24 - For LAN 192.168.30.0/24 - For Cisco 192.168.40.0/24 - For Old Lab 192.168.50.0/24 - For New Lab Isolated VLAN's 192.168.40.0/24 - For Old Lab 192.168.50.0/24 - For New Lab 6-4: VLAN Trunking Protocol VTP sends messages between trunked switches to maintain VLANs on these switches in order to properly trunk. VTP is a Cisco proprietary method of managing VLANs between switches and runs across any type of trunking mechanism. VTP messages are exchanged between switches within a common VTP domain. VTP domains must be defined or VTP disabled before a VLAN can be created. Exchanges of VTP information can be controlled by passwords. VTP manages only VLANs 2 through 1002. VTP allows switches to synchronize their VL...