How to Access The MySQL Command Line

MySQL has its own command line interpreter (CLI). You need to know how to access it to do very basic administration. You can access the MySQL CLI using the mysql command followed by the -u option for the username and -p, which tells MySQL to prompt for a password. Here user root gains access: [root@bigboy(…)

Using teaming adapters with network load balancing may cause network problems

Some hardware manufacturers offer fault tolerance with their network adapters and accompanying drivers. Fault tolerance technology lets you group network adapter ports for a connection to a single physical segment. If connectivity through one port does not work, another port is opened automatically. This operation is transparent to the operating system and other devices on(…)

How to Configure terminal server access permission

This article describes new options that you can use to assign user rights in Windows that affect the Terminal Services feature. Windows Server 2003 includes the following new User Rights options: Allow logon through Terminal Services Deny logon through Terminal Services You can use these options to change the set of permissions a user must(…)

What are the steps you can take to avoid “Deadlocks” in SQL?

Deadlocking occurs when two user processes have locks on separate objects and each process is trying to acquire a lock on the object that the other process has. When this happens, SQL Server identifies the problem and ends the deadlock by automatically choosing one process and aborting the other process, allowing the other process to(…)

How to change SQL Server Instance Name?

Each instance of SQL Server consists of a distinct set of services that have specific settings for collations and other options The directory structure, registry structure, and service names all reflect the instance name and a specific instance ID created during SQL Server Setup. An instance is either the default instance or a named instance.(…)

How to Enable TCP/IP Forwarding in Windows XP

This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem(…)

How many way to share the files in windows

7 Ways to Share Information in Windows Environment Got a document, graphic, spreadsheet, program, or just a thought you want to share with your co-workers? The method you choose to share it depends on the content you’re sharing, your personal work style, the tools you have, and if you’re at home, in your office, or(…)

Essential Linux Server Administrator Commands

Command Summary Use arp Command mostly used for checking existing Ethernet connectivity and IP address Most common use: arp This command should be used in conjunction with the ifconfig and route commands. It is mostly useful for me to check a network card and get the IP address quick. Obviously there are many more parameters,(…)

How to configureiptables to allow only specific hosts to connect to ssh service

An alternative to TCP wrappers (although you can use both at the same time) is limiting SSH access with iptables. Here’s a simple example of how you can allow only a specific host to connect to your SSH service: ~# iptables -A INPUT -p tcp -m state –state NEW –source –dport 22 -j ACCEPT(…)

How to Build a diskette-based bandwidth management system – PicoBSD

Many users, despite having a good Net connection, complain about poor surfing and download speeds. While an organization could pay for additional bandwidth, a better option might be to manage the bandwidth they already have. There are numerous bandwidth management software tools available. In this article we will explore managing network bandwidth using the dummynet(…)