This tip shows you how to improve DNS lookups by using multiple nameservers. This is useful if you’ve ever had your primary DNS server become unreachable for any reason.
This document assumes working knowledge of the Windows Registry. It is possible to render your computer useless by incorrectly modifying the Registry. Caution is advisedâ€¦ Settings pertaining to Windows NT will say Win NT. All others refer to Win9x 1.Â Â Â Remove unwanted items from Control Panel | Add/Remove programs 2.Â Â Â Changing Icons for Desktop Items(…)
How to check Windows NT, 2000, and XP Computers (workstations and servers) for missing security fixes.
Hfnetchk.exe – Is a utility from Microsoft that checks Windows NT, 2000, and XP Computers (workstations and servers) for missing security fixes. Â It is a command line utility that is run from a command prompt. Â For a full description of Hfnetchk see the MS links below. Note: A company called Shavlik Technologies is the company(…)
1. How to know which ports are listening from your IP address? # nmap -sT -O your-ip-address 2. How to grep an exact match? # grep -w textfile.txt 3. How to reverse grep matches? # grep -v textfile.txt # 4. How to know which service name is what port? Assuming port 443 # cat testfile.txt(…)
Syncronizing your current date and time is as important as making database backups. Without proper accurate stamped date and time, any backup file with any stamped date on it would be meaningless. Without correct time and date, those scripts that depend on date and time schedule would be executed inaccurately and would give you result(…)
Monitoring mailbox users can be done in many serveral ways via web interface or via terminal or via bash scripts. With the usual mbox type emails, incoming new email messages are automatically redirected to each users’ own spool file. This spool mail is by default located and stored in /var/spool/mail. From there, the spool file(…)
A very old tip and trick on blocking yahoo chat messenger from connecting to internet, as per request. Considering an approved management policies, there are several ways to block yahoo chat messenger from connecting to internet coming from inside your network, depending on what equipment and boxes you have on ground. If you happen to(…)
This document entry however covers a foundation approach and mostly used tar arguments on backing up data using the linux command tar. ============================================= Data backup samples using Tar Linux command ============================================= A very simple usage of tar # tar cvf backup.tar * Legend: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -c create a new tar file -v verbose mode -f select(…)
RSync backups data and does it very clean and well. Rsync only transfers those data that have been modified and changed so that the destination host has an exact replica from the source host. Rysnc is a command line backup tool that handles data transfers in an effective and secure manner like any other known(…)
Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs). It is a number that acts like a name for a particular network adapter, so, for example, the network cards (or built-in network adapters) in two different computers(…)
This is HTOP, an interactive process viewer for Linux. It is a text-mode application (for console or X terminals) and requires ncurses. Tested with Linux 2.4 and 2.6. HTOP process viewer is not designed to replace the current well used linux ‘top’ command, but htop is an alternative with newly added and enhanced features that(…)
A lot of powerful monitoring tools are freely available from linux world. One of them is Nagios. Nagios is a fairly complex linux monitoring tool that determines current status of target host or equipment. Two good things about Nagios is that Nagios supports web-enabled administration page and user view-only mode account. The other one is(…)