How to Tune Nagios For Maximum Performance

Optimization Tips: 1. Graph performance statistics with MRTG. In order to keep track of how well your Nagios installation handles load over time and how your configuration changes affect it, you should be graphing several important statistics with MRTG. This is really, really, really useful when it comes to tuning the performance of a Nagios(…)

How to Secure Nagios – Best Practices

Best Practices Use a Dedicated Monitoring Box. I would recommend that you install Nagios on a server that is dedicated to monitoring (and possibly other admin tasks). Protect your monitoring server as if it were one of the most important servers on your network. Keep running services to a minimum and lock down access to(…)

How to Configure a Cisco Router

Configuring your Cisco Router If you have just turned on the router, it will be completely unconfigured. If it is already configured, you may want to view its current configuration. Even if it has not been previously configured, you should familiarize yourself with the show commands before beginning to configure the router. Enter privileged mode(…)

How to use the EventCombMT utility to search event logs for account lockouts

EventCombMT is a multithreaded tool that you can use to search the event logs of several different computers for specific events, all from one central location. You can configure EventCombMT to search the event logs in a very detailed fashion. The following are some of the search parameters that you can specify: • Individual event(…)

What are DLL files?

Dynamic Link Library (DLL) files are dynamic code libraries that are used by Windows operating systems, device drivers, and various Windows-based applications to perform specific tasks on the computer. The popularity of DLL files is governed by the fact that it reduces the need to include the same code again and again in different applications.(…)

How to totally uninstall Windows Messenger

How to uninstall Windows Messenger: There are four different Messenger applications available from Microsoft. “Windows Messenger”, “ Windows Live Messenger” and the “Messenger Service”. In the following tutorial, I’ll show you how to remove any one of the them from your computer. Those who have installed MSN Messenger or Windows Live Messenger might want to(…)

WordPress SEO Search Engine Optimization tips

Search Engine Optimizationor SEO works a bit differently for those of us using WordPress blogging software. In this article I will show you a few tips on how to optimize your personal WordPress blog to obtain a higher Pagerank. Pagerank is how search engines like Google, MSN and Yahoo rate your site compared to other(…)

How To Install FreeNas

Introduction FreeNAS is an open source popular software appliance package that can turn a computer into a NAS appliance, or in easier terms: a file server. This guide shows the basic steps to prepare a server for use in a diskless LTSP environment. This document is correct as of FreeNAS v0.67.1. Full documentation on installing(…)

Best Practices for User Profiles Windows 2003

To get the best experience possible from roaming user profiles, it is important to read all the documentation and plan your implementation thoroughly. This section presents best practices for using roaming user profiles. Turn off the fast logon enhancement With the fast logon enhancement in Windows XP when users change from a local to a roaming(…)

Introduction to SSL/TLS in Windows Server 2003

SSL/TLS is most widely recognized as the protocol that provides secure HTTP (HTTPS) for internet transactions between Web browsers and Web servers. It can also be used for other application level protocols such as FTP, LDAP, and SMTP. The SSL/TLS protocol enables server authentication, client authentication, data encryption and data integrity over networks such as(…)

Folder Redirection Overview Windows 2003

Folder redirection is a feature of IntelliMirror that allows users and administrators to redirect the path of a folder to a new location. The new location can be a folder on the local computer or a directory on a network share. Users have the ability to work with documents on a server as if the(…)

Introduction to Windows 2000 Group Policy

Group policies are rules that can be defined by an administrator for a user’s desktop environment. They are an evolution of the policies that are available from the earlier Windows 95/98 and Windows NT 4.0 desktop environments. With the release of Active Directory, Microsoft has taken policies one step further by allowing for a single(…)